CISSP Practice question #158

We are performing digital forensics on one of our hard drives, which of these could be part of what use?
A: Symmetric encryption.
B: Asymmetric encryption.
C: Hashing.
D: PKI.

CBK 7: Security Operations
Source: ThorTeaches.com practice tests

Answer


C: Digital forensics: The evidence we collect must be accurate, complete, authentic, convincing, admissible. Everything is documented, chain of custody: Who had it when? What was done? When did they do it? Pull the original, put it in write protected machine, we make a hash. We only do examinations and analysis on bit level copies, we confirm they have the same hash as the original before and after examination.

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

You may also like