exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 336 discussion

Actual exam question from CompTIA's CAS-004
Question #: 336
Topic #: 1
[All CAS-004 Questions]

A forensics investigator is analyzing an executable file extracted from storage media that was submitted for evidence. The investigator must use a tool that can identify whether the executable has indicators, which may point to the creator of the file. Which of the following should the investigator use while preserving evidence integrity?

  • A. ldd
  • B. bcrypt
  • C. SHA-3
  • D. ssdeep
  • E. dcfldd
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
CXSSP
Highly Voted 1 year, 4 months ago
Selected Answer: D
D. ssdeep ssdeep is a tool used for fuzzy hashing. It's commonly employed in digital forensics to identify similar or identical files, even if they have been slightly modified. This can be useful in determining if an executable file has any indicators pointing to its creator, as it allows for the comparison of similar files. Options A, B, and E are not relevant for identifying indicators in an executable file
upvoted 6 times
...
Bright07
Most Recent 1 month ago
Selected Answer: E
dcfldd: This is a specialized version of the traditional dd tool designed for forensic imaging. It is used to create bit-by-bit copies of storage devices while ensuring the integrity of the evidence. It also provides features such as hash verification (MD5, SHA-1, etc.) to ensure the copied data matches the original data, preserving the integrity of the evidence. The investigator can use dcfldd to make a forensic copy of the executable file, preserving all the original data, including any potential metadata that might point to the creator. NOT D. ssdeep: Because this tool is used for finding "fuzzy" hashes and comparing files to identify similarities. While it can help identify files with similar characteristics, it is not focused on preserving evidence integrity or identifying the creator of an executable file.
upvoted 1 times
...
23169fd
6 months ago
Selected Answer: D
While both tools have their uses, ssdeep is more directly suited to the task of identifying indicators that may point to the creator of the file by finding similarities with other files. Therefore, D. ssdeep is the appropriate choice.
upvoted 1 times
...
EAlonso
6 months ago
A. ldd, I guess the best option from the list as it can apport something relevant as the shared libraries the executable use. ssdeep could help to compare something like a "signature" or fingerprint about the author...of course need something to compare with.
upvoted 1 times
...
surfuganda
9 months, 1 week ago
Selected Answer: E
I feel some of you need to gain some practical experience in this field. I may be wrong sometimes when pontificating opinions about how an answer could be interpreted one way or another, but this is a basic definition. E. dcfldd: dcfldd is an enhanced version of the dd command-line utility used for copying and converting data. Like dd, dcfldd is commonly used in digital forensics to create bit-for-bit copies of data, ensuring that the original evidence remains intact and unaltered during the investigation process. This preservation of evidence integrity is crucial in forensic investigations to maintain the integrity and admissibility of evidence in legal proceedings.
upvoted 3 times
...
Brianny93
1 year, 3 months ago
D. SSDEEP: Commonly used by antivirus programs, ssdeep is designed to compare files to identify matches. This is useful to identify functionally identical files that may be developed to morph and/or obfuscate themselves in order to avoid detection using strict hash matching techniques. ssdeep utilizes context triggered piecewise hashing (CTPH).
upvoted 1 times
...
Ariel235788
1 year, 3 months ago
Selected Answer: C
C. SHA-3 (Secure Hash Algorithm 3). Explanation: SHA-3 is a cryptographic hashing algorithm that generates a fixed-size hash value (checksum) for a given file. This hash value is unique to the file's content. By comparing the SHA-3 hash of the executable file in question to a known-good hash value or to other hashes from similar files, the investigator can determine if the file has been tampered with or if it matches a known executable from the same source. The other tools and methods mentioned (ldd, bcrypt, ssdeep, and dcfldd) are not typically used for identifying the creator or tampering of executable files: ldd is used to display the shared libraries required by an executable but doesn't help with identifying the creator. bcrypt is a cryptographic hashing function used for securely hashing passwords, not for identifying the creator of files. ssdeep is a tool for fuzzy hashing, used to compare similar files for similarities, but it doesn't identify the creator of files. dcfldd is a variant of the dd command used for creating and verifying forensic images, which is useful for preserving evidence integrity but not for identifying the creator of files.
upvoted 1 times
...
Uncle_Lucifer
1 year, 4 months ago
Selected Answer: D
As deep see my comments below
upvoted 4 times
...
Uncle_Lucifer
1 year, 4 months ago
What about as deep? Should be ssdeep To identify indicators that may point to the creator of an executable file while preserving evidence integrity, a forensics investigator can use the “ssdeep” tool. Ssdeep is commonly used for fuzzy hashing, which can help identify similarities between files and potentially provide information about their origin or authorship. “dcfldd” (Option E) is a digital forensics version of the “dd” command used for copying data, but it doesn’t directly assist in identifying file creators.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago