exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 235 discussion

Actual exam question from CompTIA's SY0-601
Question #: 235
Topic #: 1
[All SY0-601 Questions]

Which of the following supplies non-repudiation during a forensics investigation?

  • A. Dumping volatile memory contents first
  • B. Duplicating a drive with dd
  • C. Using a SHA-2 signature of a drive image
  • D. Logging everyone in contact with evidence
  • E. Encrypting sensitive data
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
atrax
Highly Voted 2 years, 6 months ago
Selected Answer: C
Yeah, it’s C. Nonrepudiation is specifically talking about the proof that someone has done something on the system. Taking a hash of the original disk is proof that it represents the state of the data when the investigation began. It’s not a signature in the sense of an encryption cert or something like that, but it is definitely a method of ensuring that the data on the drive represents the user’s changes, vice those of the investigator or someone else after the fact. Chain of custody doesn’t apply because nonrepudiation is talking about the data itself.
upvoted 25 times
klinkklonk
1 year, 3 months ago
You're wrong. Non-repudiation ensures that a party cannot deny the authenticity or origin of a message, action, or transaction. So a digital signature for example, or in this case a chain of custody.
upvoted 2 times
...
Kurt43
1 year, 7 months ago
looks like you're talking about integrity, not non-repudiation
upvoted 11 times
...
...
RawToast
Highly Voted 2 years, 6 months ago
Selected Answer: D
I would go with D. logging everyone in contact. While a hash function like C. would grant integrity, it only partially grants non-repudiation. The goal of non-repudiation measures is to ensure that no one can alter a claim previously made (example: digital signature proving someone sent data. They cannot deny that they sent the data because their digital signature was on the transmission.) In this case, answer D. grants non-repudiation because the logs of everyone in contact are proof of that interaction and cannot be refuted after the fact. C would only prove data was not altered.
upvoted 15 times
Afel_Null
1 year, 7 months ago
A report or log made by a human is not a hard evidence, since you can just easily log false information. A signature created via cryptographic technology is impossible to crack or alter. The answer is C.
upvoted 4 times
klinkklonk
1 year, 3 months ago
A chain of custody or log is non-repudiation. By your same logic, someone could alter the data before hashing the data as well. No system is perfect. The answer is D.
upvoted 1 times
...
...
Sandon
2 years, 3 months ago
That ain't it buddy
upvoted 11 times
...
gho5tface
1 year, 8 months ago
I believe you are referring to: chain of custody. I chose C.
upvoted 2 times
...
...
Alcpt
Most Recent 6 months, 4 weeks ago
Selected Answer: D
The answer is D. Logging everyone in contact with evidence. The question is "Which of the following supplies non-repudiation during a forensics investigation?" Think wholistically about all the artifacts involved in the investigation, not only hard disks. what about dvds u discover in an office drawer? u cant hash a dvd. You will need a chain of custody to prove non-repudiation for all the artifacts collected from an office. Else the judge will toss the case.
upvoted 1 times
...
Alcpt
8 months ago
Selected Answer: D
Dive integrity does not prove non repudiation. That is done by a chain of custody legal document. = D
upvoted 1 times
...
MALEKMALAHI
10 months ago
It's D. Using a SHA-2 signature of a drive image: This helps ensure the integrity of the copied data, but it doesn't necessarily prove who created the copy.
upvoted 1 times
...
AspiringNerd
1 year ago
Selected Answer: C
The option that supplies non-repudiation during a forensics investigation is: C. Using a SHA-2 signature of a drive image. A SHA-2 signature is a cryptographic hash generated from the drive image, which serves as a unique and verifiable identifier of the image's contents. By generating a SHA-2 signature of the drive image, investigators can ensure the integrity of the evidence and provide non-repudiation, meaning that the integrity and authenticity of the evidence cannot be denied by the parties involved. This helps establish the credibility of the forensic investigation findings and ensures that the evidence has not been tampered with.
upvoted 1 times
...
adam.regula91
1 year ago
Selected Answer: C
unsure incorrectcorrect Law enforcement has acquired a disk as evidence and copied the disk for analysis. Suggest a way to maximize the integrity of the analysis process to ensure non-repudiation is possible. (Select all that apply.) CORRECT ANSWER: Create a hash before and after analysis and compare the checksums. Use a write blocker during analysis to prevent data from being changed.
upvoted 1 times
...
Imjusthere00
1 year, 1 month ago
Selected Answer: C
I think C is the best answer here
upvoted 1 times
...
xihjr
1 year, 1 month ago
The definition of non-repudiation is: undeniable evidence that a specific action was performed by a particular individual or entity. There's only 1 answer that fits this definition
upvoted 1 times
...
ZiareKing
1 year, 2 months ago
Selected Answer: C
Verified it with Professor Messer's hashing and digital signature's sec+ content video. Answer's C....
upvoted 3 times
...
klinkklonk
1 year, 3 months ago
Selected Answer: D
While using a hash (like SHA-2) can ensure data integrity, it does not directly provide non-repudiation.
upvoted 1 times
...
Hs1208
1 year, 3 months ago
Selected Answer: C
C. Using a SHA-2 signature of a drive image Creating a SHA-2 signature involves generating a hash value for the drive image, and any changes to the image would result in a different hash value.
upvoted 1 times
...
Rr_Jay
1 year, 4 months ago
Selected Answer: C
encryption can only guaranteed for the integrity not non repudiation
upvoted 1 times
...
maggie22
1 year, 4 months ago
Selected Answer: C
Only C that make sense here when it comes to data security.
upvoted 1 times
...
Elromon
1 year, 4 months ago
Selected Answer: D
I'm saying D, Chain of custody will document when the SHA-2 hash was performed. Making it non-repudiation.
upvoted 3 times
...
MartyByrde
1 year, 5 months ago
we need stone face :/
upvoted 7 times
...
G_logic44
1 year, 5 months ago
Selected Answer: D
This is a forensics investigation and to me sounds like a much broader scope than data handling/processing where in that case I'd vote for C. But I think the answer is D since the question does not mention anything specific to data.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago