Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM Exam CFA-001 Topic 1 Question 90 Discussion

Actual exam question for GAQM's CFA-001 exam
Question #: 90
Topic #: 1
[All CFA-001 Questions]

In which step of the computer forensics investigation methodology would you run MD5 checksum on the evidence?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Jerry
2 months ago
I bet the forensic team uses a checksum calculator called 'MD5 Hammer' to really drive the point home.
upvoted 0 times
Lauran
1 months ago
C) Collect the evidence
upvoted 0 times
...
Rosio
2 months ago
B) Evaluate and secure the scene
upvoted 0 times
...
Jerry
2 months ago
A) Obtain search warrant
upvoted 0 times
...
...
Kallie
3 months ago
D) Acquire the data, definitely. Checksum that evidence like your life depends on it!
upvoted 0 times
Nicolette
1 months ago
D) Acquire the data. MD5 checksum is a key step in ensuring the evidence is not tampered with.
upvoted 0 times
...
Juliann
1 months ago
B) Evaluate and secure the scene first. Then move on to running MD5 checksum.
upvoted 0 times
...
Rebecka
1 months ago
C) Collect the evidence. MD5 checksum is crucial for data integrity.
upvoted 0 times
...
Dalene
3 months ago
D) Acquire the data, definitely. Checksum that evidence like your life depends on it!
upvoted 0 times
...
...
Leigha
3 months ago
Hmm, I'm going with B) Evaluate and secure the scene. Gotta make sure the crime scene is safe before doing anything else!
upvoted 0 times
Serita
2 months ago
Once the scene is secure, we can move on to collecting the evidence.
upvoted 0 times
...
Ollie
3 months ago
I agree, securing the scene is crucial before proceeding with anything else.
upvoted 0 times
...
...
Long
3 months ago
I think C) Collect the evidence is the right answer. You need to verify the evidence before collecting it, right?
upvoted 0 times
...
Shelton
3 months ago
I'm not sure, but I think it could also be done in the Collect the evidence step to verify the integrity of the evidence before moving on.
upvoted 0 times
...
Nana
3 months ago
I agree with Trinidad, MD5 checksum is used to ensure data integrity, so it makes sense to do it when acquiring the data.
upvoted 0 times
...
Dexter
3 months ago
D) Acquire the data seems to be the correct answer here. Running the MD5 checksum is part of the data acquisition process to ensure the integrity of the evidence.
upvoted 0 times
Allene
2 months ago
It's a crucial step in maintaining the chain of custody in computer forensics investigations.
upvoted 0 times
...
Ernie
2 months ago
MD5 checksum helps ensure that the data has not been altered during acquisition.
upvoted 0 times
...
Goldie
3 months ago
Yes, that's right. It's important to verify the integrity of the evidence.
upvoted 0 times
...
Trina
3 months ago
D) Acquire the data seems to be the correct answer here.
upvoted 0 times
...
...
Trinidad
3 months ago
I think you would run MD5 checksum in the Acquire the data step.
upvoted 0 times
...

Save Cancel