Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM Exam CFA-001 Topic 1 Question 90 Discussion

Actual exam question for GAQM's CFA-001 exam
Question #: 90
Topic #: 1
[All CFA-001 Questions]

In which step of the computer forensics investigation methodology would you run MD5 checksum on the evidence?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Jerry
28 days ago
I bet the forensic team uses a checksum calculator called 'MD5 Hammer' to really drive the point home.
upvoted 0 times
Rosio
16 days ago
B) Evaluate and secure the scene
upvoted 0 times
...
Jerry
19 days ago
A) Obtain search warrant
upvoted 0 times
...
...
Kallie
1 months ago
D) Acquire the data, definitely. Checksum that evidence like your life depends on it!
upvoted 0 times
Dalene
1 months ago
D) Acquire the data, definitely. Checksum that evidence like your life depends on it!
upvoted 0 times
...
...
Leigha
2 months ago
Hmm, I'm going with B) Evaluate and secure the scene. Gotta make sure the crime scene is safe before doing anything else!
upvoted 0 times
Serita
20 days ago
Once the scene is secure, we can move on to collecting the evidence.
upvoted 0 times
...
Ollie
1 months ago
I agree, securing the scene is crucial before proceeding with anything else.
upvoted 0 times
...
...
Long
2 months ago
I think C) Collect the evidence is the right answer. You need to verify the evidence before collecting it, right?
upvoted 0 times
...
Shelton
2 months ago
I'm not sure, but I think it could also be done in the Collect the evidence step to verify the integrity of the evidence before moving on.
upvoted 0 times
...
Nana
2 months ago
I agree with Trinidad, MD5 checksum is used to ensure data integrity, so it makes sense to do it when acquiring the data.
upvoted 0 times
...
Dexter
2 months ago
D) Acquire the data seems to be the correct answer here. Running the MD5 checksum is part of the data acquisition process to ensure the integrity of the evidence.
upvoted 0 times
Allene
8 days ago
It's a crucial step in maintaining the chain of custody in computer forensics investigations.
upvoted 0 times
...
Ernie
17 days ago
MD5 checksum helps ensure that the data has not been altered during acquisition.
upvoted 0 times
...
Goldie
1 months ago
Yes, that's right. It's important to verify the integrity of the evidence.
upvoted 0 times
...
Trina
1 months ago
D) Acquire the data seems to be the correct answer here.
upvoted 0 times
...
...
Trinidad
2 months ago
I think you would run MD5 checksum in the Acquire the data step.
upvoted 0 times
...

Save Cancel