Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISA All Questions

View all questions & answers for the CISA exam

Exam CISA topic 1 question 1301 discussion

Actual exam question from Isaca's CISA
Question #: 1301
Topic #: 1
[All CISA Questions]

Following a security incident, which of the following BEST enables the integrity of the data captured during a forensic investigation?

  • A. An expert presenting the results of forensic analysis
  • B. Comparison of the hash of data files in storage
  • C. Comparison of the data with printouts from the investigation
  • D. Maintenance of chain of custody
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
blehbleh
3 weeks, 5 days ago
Selected Answer: D
This is D. Literally for almost any exam ever if you see something about a forensic investigation you can immediately look for chain of custody as an answer and 9/10 that is the right choice. It has been explained below why it is correct but just for a heads up taking any other exam if it says forensic investigation look for chain of custody
upvoted 1 times
...
1e71ed5
3 months, 3 weeks ago
Selected Answer: D
It should be D. In forensic investigations, maintaining a chain of custody is more comprehensive because it covers the entire lifecycle of the evidence and ensures its integrity throughout the investigation process. While hash comparison is a part of this process, chain of custody provides the broader context needed for data integrity and legal admissibility.
upvoted 2 times
...
Swallows
4 months, 2 weeks ago
Selected Answer: B
Hash comparison is a common technique for verifying data integrity. By calculating hash values ​​of files in storage that hold data captured during a forensic investigation and comparing those hash values, it is possible to verify whether the data has been altered. On the other hand, maintaining a chain of custody is important to ensure the continuity and reliability of evidence, but it is not a method to directly verify data integrity. A chain of custody is used to properly manage the handling of evidence and prevent tampering or unintentional changes, but it is not a means of verifying changes to the content of specific data. Therefore, comparing the hashes of data files in storage is the most effective way to verify the integrity of data captured after a security incident.
upvoted 1 times
...
Sibsankar
5 months, 1 week ago
Hashing creates a unique digital fingerprint of data, which can be used to verify that the data has not been altered. By comparing the hash values of the data files at different stages (e.g., when they were first captured and later during analysis), investigators can confirm that the data remains unchanged, ensuring its integrity. This method is widely recognized and used in forensic investigations to maintain the authenticity and reliability of digital evidence. Right answer is B
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...