exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 81 discussion

Actual exam question from CompTIA's SY0-601
Question #: 81
Topic #: 1
[All SY0-601 Questions]

A forensic analyst needs to prove that data has not been tampered with since it was collected. Which of the following methods will the analyst MOST likely use?

  • A. Look for tampering on the evidence collection bag.
  • B. Encrypt the collected data using asymmetric encryption.
  • C. Ensure proper procedures for chain of custody are being followed.
  • D. Calculate the checksum using a hashing algorithm.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
rodwave
Highly Voted 2 years, 7 months ago
Selected Answer: D
Answer: Calculate the checksum using a hashing algorithm. (D) A checksum is specifically intended to verify the integrity of data or find data corruption. Comparing a file's original and current checksum. And if a byte or even a piece of the file's data has been changed, the original and current checksum will be different, and therefore you will know whether it's the same file or not. ===================== (A) - This is essentially the physical version of checking if something was tampered but wouldn't work for virtual data (B) - Dont need to encrypt anything (C) - Even if a proper chain of custody was followed, it doesn't guarantee that data hasn't been modified by anyone that had access to the data.
upvoted 45 times
...
stoneface
Highly Voted 2 years, 10 months ago
Selected Answer: C
Procedure to establish the Chain of Custody In order to assure the authenticity of the chain of custody, a series of steps must be followed. It is important to note that the more information Forensic expert obtains concerning the evidence, the more authentic is the created chain of custody. You should ensure that the following procedure is followed according to the chain of custody for electronic devices: Save the original material Take photos of the physical evidence Take screenshots of the digital evidence. Document date, time, and any other information on the receipt of the evidence. Inject a bit-for-bit clone of digital evidence content into forensic computers. Perform a hash test analysis to authenticate the working clone.
upvoted 19 times
KetReeb
2 years, 10 months ago
While your reasoning is a best practice, the only way to Prove the integrity of the data after its been handled is by verifying the checksum (Answer D).
upvoted 50 times
stoneface
2 years, 10 months ago
I stand corrected -> D is correct - ensuring is not a method
upvoted 32 times
Kraken84
1 year, 10 months ago
Now that is a RFM!
upvoted 1 times
...
KetReeb
2 years, 10 months ago
I'm sorry stoneface, I have to retract my comment after running across the following in the all-in-one review: regarding checksums - A disadvantage is that they miss larger numbers of errors as a second error can cancel the effect of the first on a checksum. Thus, checksums serve no real purpose in digital forensics. Your answer is best.
upvoted 12 times
CTE_Instructor
2 years, 3 months ago
It's near impossible for a second change in data integrity to "undo" the hash effect of the first error. Multiple changes in file data will still produce different hash results. Checking hash results of the original collection vs present state is standard for verifying data integrity.
upvoted 3 times
...
...
...
...
...
MasterControlProgram
Most Recent 1 year, 3 months ago
Selected Answer: D
He or she needs to run a checksum.
upvoted 2 times
...
Yomzie
1 year, 5 months ago
"...needs to prove that data has not been tampered" The only way to prove this, is by calculating a CHECKSUM for data collected at each stage of the discovery (D). Ensuring a "chain of custody" is adhered to, would not be enough basis of proof, that someone within the chain DID NOT tamper with the data, and pass it further along.
upvoted 1 times
...
daddylonglegs
1 year, 8 months ago
Everyone picking Chain of Custody is missing the point. Establishing a chain of custody doesn't prevent tampering nor allow you to prove that data has been tampered. What it does is give you an audit trail to follow if you discover that evidence was in fact tampered with, and you can use it to identify who in the chain of custody tampered with the evidence. To actually PROVE that the data hasn't been tampered with, you would calculate a checksum, likely at each step of the chain of custody when the data is received by the next party.
upvoted 6 times
...
BigAl5505
1 year, 9 months ago
Selected Answer: D
There is no chain of custody for data transmission, chain of custody is mainly for equipment/devices that are used on the network by end-users. Hashing and checksum are the only ways to check the integrity of data.
upvoted 1 times
...
assfedassfinished
1 year, 10 months ago
Selected Answer: D
It's D. Consider the role. The analyst, as the expert, would validate the checksum. A lawyer or court official would validate via the CoC. Additionally, anyone can access the data, change it, and properly mark up the chain of custody. If only using the chain of custody without validating the integrity, false data would be accepted.
upvoted 4 times
...
BigIshai
1 year, 11 months ago
The question asked for what method to verify the integrity of the file in question. the simple answer is to compare the hash valve with the original when it was collected. The correct answer is D. Ensuring that the proper chain of custody was followed is still subject to interpretation and can not prove the data has not changed.
upvoted 2 times
...
Nikamy
1 year, 11 months ago
Selected Answer: D
My answer is D
upvoted 1 times
...
Protract8593
1 year, 11 months ago
Selected Answer: D
A checksum is a value derived from the content of data, and it serves as a unique identifier for that data. When data is collected for forensic analysis, the forensic analyst can calculate the checksum using a hashing algorithm (such as MD5, SHA-256, etc.). If the data remains unchanged and has not been tampered with, the checksum will remain the same. Any alteration or tampering of the data would result in a different checksum value. By comparing the calculated checksum of the collected data with a known, trusted checksum (such as the original value), the forensic analyst can verify that the data has not been tampered with since it was collected. This process ensures data integrity and is commonly used in digital forensics to validate the authenticity of evidence.
upvoted 1 times
...
ApplebeesWaiter1122
1 year, 12 months ago
Selected Answer: D
Calculating the checksum using a hashing algorithm is a common technique in forensic analysis to ensure data integrity. A hashing algorithm takes the data as input and generates a unique hash value, which is a fixed-length string of characters. Even a small change in the input data will result in a significantly different hash value. By comparing the calculated checksum of the collected data with a previously generated checksum of the original data, the forensic analyst can determine if any tampering or alteration has occurred.
upvoted 2 times
...
EvelynStandford
2 years, 1 month ago
Selected Answer: C
i started with C after i read all the comment and i was sure it was D but i find this and it make me change my mind Difference Between a Checksum and a Hash Checksums and similarity hashes are often used interchangeably, but they have slight differences. In a nutshell, a Checksum is a hash, but a hash isn’t necessarily a Checksum. Hashing Applications Encryption Storage Performance Why Use Checksums? Why use checksums to compare data over byte-by-byte comparison? The answer: because it is much smaller (256 bits). Byte by Byte comparison requires having the entire copy of files which can be very large (gigabytes). A checksum’s relatively small size is small enough to be treated as file metadata. How can Checksums be Used? Checksums can be used in many ways: in search engines to check for duplicate documents, in engineering to check for corrupted files in cryptography to transfer data securely.
upvoted 1 times
MortG7
1 year, 4 months ago
Nope..."Ensure proper procedures..." doe snot prove data has not been tampered with. checksum before and after to prove nothing changed...of course provided the checksum matches. We do this all the time at work when installing vendor software. We calculate the hash of the downloaded package against the vendor's published hash value. D is absolutely correct.
upvoted 1 times
...
EvelynStandford
2 years, 1 month ago
also i find an other source where they say Step 5: Run the validate command with the clip file name attached to get the checksum for that clip (For PC: Hash = Checksum) Command for a proper chain of custody, so if they ensure that the checksum is included in the procedure
upvoted 1 times
...
...
fouserd
2 years, 1 month ago
Selected Answer: C
To prove that data has not been tampered with since it was collected, a forensic analyst would MOST likely calculate the checksum using a hashing algorithm. A hashing algorithm generates a unique fixed-size string of characters, called a hash or checksum, from a given input. By calculating the hash of the collected data and comparing it to the hash calculated at the time of collection, the analyst can verify that the data has not been altered.
upvoted 1 times
fouserd
2 years, 1 month ago
Apologies meant to click D not C
upvoted 2 times
...
...
Yawannawanka
2 years, 2 months ago
C. Ensure proper procedures for chain of custody are being followed. Proper chain of custody procedures ensure that the evidence is properly collected, stored, and transferred to prevent tampering or alteration. By following these procedures, the forensic analyst can demonstrate that the evidence has not been tampered with since it was collected, and can be relied upon as authentic and admissible in court. The other options do not directly address the issue of proving that data has not been tampered with.
upvoted 1 times
...
Confuzed
2 years, 2 months ago
Selected Answer: D
While ensuring proper chain of custody is critical, following the process is how you ensure that tampering/mishandling doesn't occur, not how you prove it didn't. To prove that tampering did not occur, the analyst would use hashing.
upvoted 2 times
...
KnifeClown1
2 years, 2 months ago
Selected Answer: D
A checksum is a unique value that is generated from a mathematical algorithm applied to the data. If the data is tampered with in any way, the checksum value will also change, indicating that the data has been altered. By comparing the original checksum value with the current checksum value, the forensic analyst can determine whether the data has been tampered with since it was collected.
upvoted 1 times
...
ffsilveira10
2 years, 2 months ago
Selected Answer: C
I believe that the correct option is C. When they say "data" they do not specific which type of data, could be digital or not. If not digital then the checksum will not be helful. In this case the most likely approach would be keep chain of custody.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...