An employee is suspected of misusing a company-issued laptop. The employee has been suspended pending an investigation by human resources. Which of the following is the best step to preserve evidence?
A.
Disable the user’s network account and access to web resources.
B.
Make a copy of the files as a backup on the server.
C.
Place a legal hold on the device and the user’s network share.
D.
Make a forensic image of the device and create a SHA-1 hash.
Read the question, "An employee is suspected of misusing a company-issued laptop. The employee has been suspended pending an investigation by human resources. Which of the following is the best step to preserve evidence?"
The focus is the laptop. We need to image it and hash the image.
The answer cant be legal hold as there is not regulatory or legal invoked. It says he misused the laptop, no detail was given to how it was misused. There are a number of things he could have been doing which would have been against company policy, but would not have triggered a legal hold. There is nothing to indicate there is potential litigation pending.
This approach ensures that a complete and exact copy of all the data on the device is made, which is essential for a forensic investigation. The SHA-1 hash is used to verify the integrity of the data, ensuring that the forensic image is an exact, unaltered copy of the original data. This is critical for legal and investigative purposes, as it ensures the admissibility of the evidence in any potential legal proceedings.
Correct Answer: D.
Analysis: Making a forensic image of the device and creating a SHA-1 hash is the best step to preserve evidence. This process ensures that a bit-by-bit copy of the device is taken, preserving the original state of the data for future analysis and investigation. The SHA-1 hash provides a cryptographic verification that the copy is identical to the original, which is crucial for maintaining the integrity of the evidence.
since they mentioned that the employee was suspended. They are indicating that he will no longer be using his machine until the investigation is done. C sounds about right.
Question is not asking for first step nor gave any details into the nature of the misuse. It just what asked is the step to preserve evidence. The only step that guarantees the evidence is preserved and not tampered with is D (one can check for tampering with hashes, even if it is an outdated one).
Even with SHA-1 being old this is the best answer available. There would be no reason to put a legal hold on the laptop as it is the property of the company and would be returned or confiscated anyways. A legal hold would make more sense if it mentioned they had a BYOD policy and the user was using their' own laptop.
C. Place a legal hold on the device and the user’s network share.
CertMaster Topic 8B:
A legal hold, or litigation hold, describes the notification received by an organization's legal team instructing them to preserve electronically stored information (ESI) and/or paper documents that may be relevant to a pending legal case. Legal hold authority can be complicated by jurisdiction, but these details are managed by legal teams. It is imperative that the cybersecurity team be notified of legal holds as soon as possible in order to ensure data is preserved in accordance with the order. Legal hold requirements often exceed the data protection and retention periods ordinarily in place.
NIST recommended SHA-1 should be phased out by Dec. 31, 2030 as far as I know this question doesnt mention taking place in the future.
SHA-1 would be a problem here if there was a hashed password that they were trying to secure. There isnt one, so thats not even the problem being addressed here.
Also what if the user has a logic bomb that says "if i dont log in to my network share account in X amount of time, just wipe my account." Now while the law is creeping slowly toward a resolution that account is being wiped. I argue that one should forensically copy that persons device and their storage on the network share drive hash it.
Im gonna argue for D on this one, however im open to the wisdom/counter arguments of others.
Also...
The question asks for BEST solution not for the FIRST step.
Hear me out.
Sure sha1 was deprecated... but it was done so because of the expected ease of AI having the ability to crack/ brute force it, which wouldnt be a problem here as their goal here
is to ensure that evidence is preserved, which having a hash of the drive that was copied would allow you to know. That drive and hash would be in the possession of the
forensic analyst within a forensic environment. There would be no realistic risk of that hash being brute forced.
I'm going with D since C is an administrative process, and not an actual technical process of preserving evidence. The Legal Hold is simply an order, but it does nothing to preserve the data.
The answer is D because C does not preserve evidence which is what the question is asking. Sometimes you have to look for those keywords because there will usually be two or good answers.
still I think C is correct - as Legal hold triggers that processes are started to preserve data - see comptia study guide, chapter 10, evidence acquisition and preservation.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
b0ad9e1
Highly Voted 1 year agosection8santa
Highly Voted 9 months, 1 week agoluiiizsoares
Most Recent 1 month, 2 weeks agoAziz132
2 months, 1 week ago_invalid_nickname
3 months, 1 week agommsbaseball3
5 months, 1 week agomaggie22
7 months agoMehe323
7 months, 4 weeks agocaptaintoadyo
8 months, 1 week agoKmelaun
9 months agoyeahnodontthinkso
2 weeks, 6 days ago89b45b4
10 months, 2 weeks agothroughthefray
1 year agothroughthefray
1 year agodeeden
1 year, 1 month ago[Removed]
1 year, 1 month agoLiveLaughToasterBath
1 year, 1 month ago[Removed]
1 year, 1 month ago[Removed]
1 year, 1 month ago581777a
1 year, 2 months agomuvisan
1 year, 2 months ago581777a
1 year, 2 months agoRT7
1 year, 2 months ago