New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM CFA-001 Exam - Topic 1 Question 90 Discussion

Actual exam question for GAQM's CFA-001 exam
Question #: 90
Topic #: 1
[All CFA-001 Questions]

In which step of the computer forensics investigation methodology would you run MD5 checksum on the evidence?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Pamella
3 months ago
Nope, it’s definitely not in the search warrant phase.
upvoted 0 times
...
Brandee
3 months ago
Surprised to see people confused about this!
upvoted 0 times
...
Maryanne
3 months ago
I thought it was part of collecting the evidence?
upvoted 0 times
...
Delisa
4 months ago
Totally agree, that's when you check the integrity.
upvoted 0 times
...
Mira
4 months ago
It’s during the "Acquire the data" step!
upvoted 0 times
...
Naomi
4 months ago
I thought checksums were more about securing the data, but now I'm confused if that’s part of the acquisition step instead.
upvoted 0 times
...
Lashandra
4 months ago
I practiced a similar question, and I feel like it was related to collecting the evidence, so maybe it's step C?
upvoted 0 times
...
Xuan
4 months ago
I’m not entirely sure, but I remember something about checksums being used after collecting evidence to verify integrity.
upvoted 0 times
...
Julio
5 months ago
I think running the MD5 checksum is part of the data acquisition process, so it might be in step D.
upvoted 0 times
...
Helene
5 months ago
Ah, I remember learning about this in class. The MD5 checksum is used to ensure the evidence hasn't been tampered with, so it would be done during the "Collect the evidence" step.
upvoted 0 times
...
Francene
5 months ago
The MD5 checksum is all about verifying the integrity of the evidence, so I'd say it's most likely in the "Acquire the data" step.
upvoted 0 times
...
Kiera
5 months ago
Hmm, I'm a bit unsure about this one. I think it might be in the "Collect the evidence" step, but I'm not 100% certain.
upvoted 0 times
...
Danilo
5 months ago
I'm pretty sure this would be done during the "Acquire the data" step, since that's when you're actually collecting the evidence and need to verify its integrity.
upvoted 0 times
...
Hoa
5 months ago
I'm confident the MD5 checksum is part of the "Acquire the data" step, as that's when you're actually capturing the evidence and need to make sure it's authentic.
upvoted 0 times
...
Lucina
5 months ago
Hmm, this looks like a tricky one. I'll need to carefully analyze the SQL statement and the table structures to figure out the right answer.
upvoted 0 times
...
Jerry
10 months ago
I bet the forensic team uses a checksum calculator called 'MD5 Hammer' to really drive the point home.
upvoted 0 times
Lauran
9 months ago
C) Collect the evidence
upvoted 0 times
...
Rosio
9 months ago
B) Evaluate and secure the scene
upvoted 0 times
...
Jerry
9 months ago
A) Obtain search warrant
upvoted 0 times
...
...
Kallie
10 months ago
D) Acquire the data, definitely. Checksum that evidence like your life depends on it!
upvoted 0 times
Nicolette
8 months ago
D) Acquire the data. MD5 checksum is a key step in ensuring the evidence is not tampered with.
upvoted 0 times
...
Juliann
8 months ago
B) Evaluate and secure the scene first. Then move on to running MD5 checksum.
upvoted 0 times
...
Rebecka
9 months ago
C) Collect the evidence. MD5 checksum is crucial for data integrity.
upvoted 0 times
...
Dalene
10 months ago
D) Acquire the data, definitely. Checksum that evidence like your life depends on it!
upvoted 0 times
...
...
Leigha
10 months ago
Hmm, I'm going with B) Evaluate and secure the scene. Gotta make sure the crime scene is safe before doing anything else!
upvoted 0 times
Serita
9 months ago
Once the scene is secure, we can move on to collecting the evidence.
upvoted 0 times
...
Ollie
10 months ago
I agree, securing the scene is crucial before proceeding with anything else.
upvoted 0 times
...
...
Long
10 months ago
I think C) Collect the evidence is the right answer. You need to verify the evidence before collecting it, right?
upvoted 0 times
...
Shelton
10 months ago
I'm not sure, but I think it could also be done in the Collect the evidence step to verify the integrity of the evidence before moving on.
upvoted 0 times
...
Nana
11 months ago
I agree with Trinidad, MD5 checksum is used to ensure data integrity, so it makes sense to do it when acquiring the data.
upvoted 0 times
...
Dexter
11 months ago
D) Acquire the data seems to be the correct answer here. Running the MD5 checksum is part of the data acquisition process to ensure the integrity of the evidence.
upvoted 0 times
Allene
9 months ago
It's a crucial step in maintaining the chain of custody in computer forensics investigations.
upvoted 0 times
...
Ernie
9 months ago
MD5 checksum helps ensure that the data has not been altered during acquisition.
upvoted 0 times
...
Goldie
10 months ago
Yes, that's right. It's important to verify the integrity of the evidence.
upvoted 0 times
...
Trina
10 months ago
D) Acquire the data seems to be the correct answer here.
upvoted 0 times
...
...
Trinidad
11 months ago
I think you would run MD5 checksum in the Acquire the data step.
upvoted 0 times
...

Save Cancel