New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GCFA Exam - Topic 4 Question 24 Discussion

Actual exam question for GIAC's GCFA exam
Question #: 24
Topic #: 4
[All GCFA Questions]

Which of the following cryptographic methods are used in EnCase to ensure the integrity of the data, which is acquired for the investigation?

Each correct answer represents a complete solution. Choose two.

Show Suggested Answer Hide Answer
Suggested Answer: A, B

Contribute your Thoughts:

0/2000 characters
Miles
4 months ago
Twofish? That’s not for integrity checks, right?
upvoted 0 times
...
Ivory
4 months ago
Yup, MD5 is definitely one of them!
upvoted 0 times
...
Catherin
4 months ago
Wait, I thought HAVAL was more common in other tools?
upvoted 0 times
...
Emelda
4 months ago
Totally agree, MD5 is a classic for checksums!
upvoted 0 times
...
Frederic
5 months ago
MD5 and CRC are the ones used in EnCase.
upvoted 0 times
...
Barrie
5 months ago
I feel like HAVAL is more of a hashing algorithm, so I doubt it's used in EnCase for integrity.
upvoted 0 times
...
Britt
5 months ago
I remember practicing a question like this, and I think CRC might be used too, but I can't recall if it's the best choice.
upvoted 0 times
...
Kina
5 months ago
I think MD5 is definitely one of the methods used for integrity checks, but I'm not sure about the second one.
upvoted 0 times
...
Shawnna
5 months ago
I'm leaning towards MD5 and CRC as the answers, but I wish I had reviewed more about Twofish before the exam.
upvoted 0 times
...
Ivette
5 months ago
Hmm, I'm a bit unsure about this one. The message seems to indicate that the file was saved to external memory, but I'm not sure if that's the intended meaning or if it's just a generic message. I'll need to think this through carefully.
upvoted 0 times
...
Tyisha
5 months ago
I think this is a pretty straightforward question. Variable pay is clearly compensation that's contingent on performance, so I'm going to go with option B.
upvoted 0 times
...
Dean
5 months ago
Hmm, I'm a bit confused on this one. I know SYN attacks are related to TCP, but I'm not sure exactly which aspect they exploit. I'll have to think this through carefully.
upvoted 0 times
...
Reiko
5 months ago
Okay, I think I've got a handle on this. I'll start by calculating the net book value of the existing equipment, then factor that into the net initial investment. Shouldn't be too tricky if I stay organized.
upvoted 0 times
...
Portia
5 months ago
Okay, let me think this through. I need to enable the Azure Policy guest configuration feature, so I'm guessing I'll need to set up some kind of identity for the VM. I'll try option B and see if that works.
upvoted 0 times
...

Save Cancel