New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 112-57 Exam - Topic 12 Question 1 Discussion

Actual exam question for Eccouncil's 112-57 exam
Question #: 1
Topic #: 12
[All 112-57 Questions]

Which of the following techniques is used to compute the hash value for a given binary code to uniquely identify malware or periodically verify changes made to the binary code during analysis?

Show Suggested Answer Hide Answer
Suggested Answer: A

File fingerprinting is the forensic technique of generating a cryptographic hash (such as MD5, SHA-1, SHA-256) for a file to create a unique, repeatable identifier for that exact byte sequence. In malware forensics, analysts compute hashes to (1) uniquely identify a suspicious binary across cases and tools, (2) confirm whether two samples are identical or different variants, and (3) verify integrity over time---for example, ensuring the sample did not change during copying, extraction, sandbox handling, or during an analysis workflow that might inadvertently modify the file (e.g., patching, unpacking outputs, or tool-side normalization). Re-hashing at different stages provides a defensible way to demonstrate that the analyzed artifact is the same as the acquired artifact, supporting evidentiary integrity and chain-of-custody principles commonly emphasized in digital forensics documentation.

The other techniques do not primarily serve this purpose. Strings search extracts readable text fragments but does not produce a unique integrity identifier. Local and online malware scanning uses signatures/reputation and may identify families, but it is not an integrity verification mechanism for the exact file bytes. Malware disassembly helps understand logic and instructions, not compute an identity hash. Therefore, the correct answer is File fingerprinting (A).


Contribute your Thoughts:

0/2000 characters

Currently there are no comments in this discussion, be the first to comment!


Save Cancel