exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 534 discussion

Actual exam question from Isaca's CISM
Question #: 534
Topic #: 1
[All CISM Questions]

A desktop computer is being used to perpetrate a fraud, and data on the machine must be secured for evidence. Which of the following should be done FIRST?

  • A. Encrypt the content of the hard drive using a strong algorithm.
  • B. Obtain a hash of the desktop computer's internal hard drive.
  • C. Copy the data on the computer to an external hard drive.
  • D. Capture a forensic image of the computer.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
yottabyte
3 months, 3 weeks ago
Selected Answer: B
You obtain a hash value of a hard disk first before capturing an image. Capturing an image and hashing it after will not be the same hash after you restore the image. Hash first, image next, restore then, compare hash.
upvoted 1 times
d7a2ba6
3 weeks, 4 days ago
Basically you do the two in one go. You do not read the disk twice. You connect the drive to an external device in read only mode (hw and sw solutions both exist) and do a copy while calculating the hash. And in most cases you calculate many hashes (every n MB/GB) so if something changes you can tell if the imortant parts changed or something else. Because there can be a hw failure /read error later.
upvoted 1 times
...
...
yottabyte
3 months, 3 weeks ago
Selected Answer: B
B. hash it first and then capture an image, once you restore the image, you compare the hash for integrity.
upvoted 1 times
...
AlexJacobson
5 months, 2 weeks ago
Selected Answer: B
Phases in a cyber forensic procedure: - Identification: Determining which evidence is required for the purpose. - Preservation: Deciding how to maintain the integrity and security of extracted evidence. - Analysis: Understanding the insights the information does (and does not) provide. - Documentation. ... - Presentation. So apparently, you calculate the hash first, before you touch anything. In reality, imaging software usually does this (calculates hash value) in the process of creating a bit-for-bit copy of the source.
upvoted 3 times
...
maisarajarrah
6 months, 2 weeks ago
which one is frist is forensic image or generate the hash for data integrity ChatGPT In a typical digital forensic investigation or data integrity verification process, creating a forensic image is generally performed before generating a hash for data integrity. Forensic Image Creation: The first step often involves creating a forensic image of the original storage media or system. This image is an exact copy of the entire storage device, capturing not only the data but also the structure and metadata. Creating a forensic image is crucial to preserve the original evidence without altering or contaminating it during the investigation. Generating Hash for Data Integrity: Once the forensic image is created, the next step is often to generate a hash value (checksum) for the image file. A hash function processes the entire content of the file and produces a fixed-size hash value. This hash value serves as a digital fingerprint for the forensic image.
upvoted 1 times
POWNED
6 months, 1 week ago
Good to know take nothing you post as valid because you are using ChatGPT
upvoted 1 times
...
...
POWNED
6 months, 2 weeks ago
Selected Answer: B
Took a forensics class, you got to hash first.
upvoted 1 times
POWNED
6 months, 1 week ago
The proper checks and balances are necessary for successful image duplication, requiring the image-makers to perform a hash calculation before and after the creation of a forensic image. A hash calculation verifies that the image wasn’t altered or damaged during an imaging process. If the duplication is successful, then the hash of both the original copy and imaged copy should be the same.
upvoted 3 times
...
...
Soleandheel
7 months, 3 weeks ago
D. Capture a forensic image of the computer. is the best answer here. You will need to obtain a hash of the desktop computer's internal hard drive for the purposes of integrity only after taking a forensic image. The hash will help monitor that nothing is changed or altered after the forensic image has been taken. So first you take a forensic image and then second you obtain a hash for integrity purposes. D. Capture a forensic image of the computer. is the correct answer for sure.
upvoted 2 times
...
koala_lay
10 months ago
Selected Answer: D
The first step should be to capture a forensic image of the computer. A forensic image is a bit-by-bit copy of the entire hard drive that preserves the original data and metadata. It is important to have an exact replica of the computer's hard drive to ensure the integrity of the evidence. Once the forensic image is captured, it can be analyzed and examined without altering the original data. This will allow investigators to identify and secure any incriminating evidence on the computer while maintaining its original state.
upvoted 3 times
...
6and0
10 months ago
Selected Answer: B
B. Obtain a hash of the desktop computer's internal hard drive. Its best practice to obtain the hash (checksum) of a computer hard drive before making a forensic copy of the drive in digital forensics. "hashing before acquisition"
upvoted 3 times
...
oluchecpoint
10 months, 1 week ago
Selected Answer: D
Option D
upvoted 2 times
...
Akam
10 months, 2 weeks ago
Selected Answer: B
If you want the evidence to be admissible in court, then first hash the original, and take a copy, then hash the copy, and both hashes shall be the same. So, B is the correct answer.
upvoted 3 times
...
Vesta1807
11 months, 2 weeks ago
Selected Answer: B
B Is correct answer here
upvoted 1 times
...
Vesta1807
11 months, 2 weeks ago
B Is correct answer here. When gathering information from storage devices, analysts should never access hard drives or other media from a live system. Instead, they should power off the system (after collecting other evidence), remove the storage device, and then attach the storage device to a dedicated forensic workstation, using a write blocker. Write blockers are hardware adapters that physically sever the portion of the cable used to connect the storage device that would write data to the device, reducing the likelihood of accidental tampering with the device. After connecting the device to a live workstation, the analyst should immediately calcu- late a cryptographic hash of the device contents and then use forensic tools to create a forensic image of the device: a bitwise copy of the data stored on the device. The analyst should then compute the cryptographic hash of that image to ensure that it is identical to the original media contents.
upvoted 2 times
...
wickhaarry
11 months, 3 weeks ago
D https://www.linkedin.com/pulse/forensic-acquisition-methods-investigators-manual-2018-shahul-ahmed
upvoted 2 times
...
richck102
1 year ago
D. Capture a forensic image of the computer.
upvoted 2 times
...
karanvp
1 year ago
Selected Answer: B
Correct Answer B: Keyword here is FIRST. Before capture image for forensic, must feed Hash, so that authenticity of evidence confirmed.
upvoted 1 times
...
wello
1 year ago
Selected Answer: D
taking a forensic image of the computer does not only include the hard drives, it also includes data in RAM. it is a snapshot of the status of the computer. This should be done first.
upvoted 2 times
...
Ewunia
1 year, 1 month ago
Selected Answer: D
forensic copy first
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago