exam questions

Exam CS0-003 All Questions

View all questions & answers for the CS0-003 exam

Exam CS0-003 topic 1 question 92 discussion

Actual exam question from CompTIA's CS0-003
Question #: 92
Topic #: 1
[All CS0-003 Questions]

An employee is suspected of misusing a company-issued laptop. The employee has been suspended pending an investigation by human resources. Which of the following is the best step to preserve evidence?

  • A. Disable the user’s network account and access to web resources.
  • B. Make a copy of the files as a backup on the server.
  • C. Place a legal hold on the device and the user’s network share.
  • D. Make a forensic image of the device and create a SHA-1 hash.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
b0ad9e1
Highly Voted 1 year ago
Selected Answer: D
Read the question, "An employee is suspected of misusing a company-issued laptop. The employee has been suspended pending an investigation by human resources. Which of the following is the best step to preserve evidence?" The focus is the laptop. We need to image it and hash the image. The answer cant be legal hold as there is not regulatory or legal invoked. It says he misused the laptop, no detail was given to how it was misused. There are a number of things he could have been doing which would have been against company policy, but would not have triggered a legal hold. There is nothing to indicate there is potential litigation pending.
upvoted 11 times
...
section8santa
Highly Voted 9 months, 1 week ago
Selected Answer: D
This approach ensures that a complete and exact copy of all the data on the device is made, which is essential for a forensic investigation. The SHA-1 hash is used to verify the integrity of the data, ensuring that the forensic image is an exact, unaltered copy of the original data. This is critical for legal and investigative purposes, as it ensures the admissibility of the evidence in any potential legal proceedings.
upvoted 7 times
...
luiiizsoares
Most Recent 1 month, 2 weeks ago
Selected Answer: D
Correct Answer: D. Analysis: Making a forensic image of the device and creating a SHA-1 hash is the best step to preserve evidence. This process ensures that a bit-by-bit copy of the device is taken, preserving the original state of the data for future analysis and investigation. The SHA-1 hash provides a cryptographic verification that the copy is identical to the original, which is crucial for maintaining the integrity of the evidence.
upvoted 1 times
...
Aziz132
2 months, 1 week ago
since they mentioned that the employee was suspended. They are indicating that he will no longer be using his machine until the investigation is done. C sounds about right.
upvoted 1 times
...
_invalid_nickname
3 months, 1 week ago
Selected Answer: D
Question is not asking for first step nor gave any details into the nature of the misuse. It just what asked is the step to preserve evidence. The only step that guarantees the evidence is preserved and not tampered with is D (one can check for tampering with hashes, even if it is an outdated one).
upvoted 2 times
...
mmsbaseball3
5 months, 1 week ago
Selected Answer: D
Even with SHA-1 being old this is the best answer available. There would be no reason to put a legal hold on the laptop as it is the property of the company and would be returned or confiscated anyways. A legal hold would make more sense if it mentioned they had a BYOD policy and the user was using their' own laptop.
upvoted 1 times
...
maggie22
7 months ago
Selected Answer: D
Forensic imaging. Do not focus on the laptop. Focus on the question.
upvoted 3 times
...
Mehe323
7 months, 4 weeks ago
Selected Answer: D
The SHA-1 part is weird, but C can not actually stop a user from making changes until the laptop is seized, so that is why I chose D.
upvoted 2 times
...
captaintoadyo
8 months, 1 week ago
Selected Answer: C
Sha1 is very old is not advised to be used as it is very insecure...
upvoted 2 times
...
Kmelaun
9 months ago
Selected Answer: C
C. Place a legal hold on the device and the user’s network share. CertMaster Topic 8B: A legal hold, or litigation hold, describes the notification received by an organization's legal team instructing them to preserve electronically stored information (ESI) and/or paper documents that may be relevant to a pending legal case. Legal hold authority can be complicated by jurisdiction, but these details are managed by legal teams. It is imperative that the cybersecurity team be notified of legal holds as soon as possible in order to ensure data is preserved in accordance with the order. Legal hold requirements often exceed the data protection and retention periods ordinarily in place.
upvoted 1 times
yeahnodontthinkso
2 weeks, 6 days ago
I see where you're coming from but there's nothing to indicate that the employee did anything illegal. They simply broke company policy.
upvoted 1 times
...
...
89b45b4
10 months, 2 weeks ago
Selected Answer: D
It only says "best step to preserve evidence" which means make a forensic image.
upvoted 2 times
...
throughthefray
1 year ago
Selected Answer: D
NIST recommended SHA-1 should be phased out by Dec. 31, 2030 as far as I know this question doesnt mention taking place in the future. SHA-1 would be a problem here if there was a hashed password that they were trying to secure. There isnt one, so thats not even the problem being addressed here. Also what if the user has a logic bomb that says "if i dont log in to my network share account in X amount of time, just wipe my account." Now while the law is creeping slowly toward a resolution that account is being wiped. I argue that one should forensically copy that persons device and their storage on the network share drive hash it. Im gonna argue for D on this one, however im open to the wisdom/counter arguments of others.
upvoted 3 times
throughthefray
1 year ago
Also... The question asks for BEST solution not for the FIRST step. Hear me out. Sure sha1 was deprecated... but it was done so because of the expected ease of AI having the ability to crack/ brute force it, which wouldnt be a problem here as their goal here is to ensure that evidence is preserved, which having a hash of the drive that was copied would allow you to know. That drive and hash would be in the possession of the forensic analyst within a forensic environment. There would be no realistic risk of that hash being brute forced.
upvoted 4 times
...
...
deeden
1 year, 1 month ago
Selected Answer: C
It appears this question is similar to whether to: A. secure the crime scene; or B. start collecting evidence. Most people choose A.
upvoted 1 times
...
[Removed]
1 year, 1 month ago
Selected Answer: C
Came back to this one. SHA-1 was indeed deprecated last year (2022). C is the best option since D can be eliminated.
upvoted 1 times
...
LiveLaughToasterBath
1 year, 1 month ago
Selected Answer: C
SHA-1 was deprecated for use by NIST.
upvoted 3 times
[Removed]
1 year, 1 month ago
Came back to this one. Sure enough, SHA-1 was indeed deprecated last year (2022). I agree with C being the best option since D can be eliminated.
upvoted 1 times
...
...
[Removed]
1 year, 1 month ago
Selected Answer: D
I'm going with D since C is an administrative process, and not an actual technical process of preserving evidence. The Legal Hold is simply an order, but it does nothing to preserve the data.
upvoted 1 times
...
581777a
1 year, 2 months ago
Selected Answer: D
The answer is D because C does not preserve evidence which is what the question is asking. Sometimes you have to look for those keywords because there will usually be two or good answers.
upvoted 3 times
muvisan
1 year, 2 months ago
still I think C is correct - as Legal hold triggers that processes are started to preserve data - see comptia study guide, chapter 10, evidence acquisition and preservation.
upvoted 1 times
581777a
1 year, 2 months ago
I appreciate the insight, it makes sense then. I have my test in the morning so I hope it's right lol
upvoted 2 times
RT7
1 year, 2 months ago
Hi 581777a- Just wondering if your test had most of the questions listed in here?
upvoted 4 times
...
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago