Yeah, it’s C. Nonrepudiation is specifically talking about the proof that someone has done something on the system. Taking a hash of the original disk is proof that it represents the state of the data when the investigation began. It’s not a signature in the sense of an encryption cert or something like that, but it is definitely a method of ensuring that the data on the drive represents the user’s changes, vice those of the investigator or someone else after the fact. Chain of custody doesn’t apply because nonrepudiation is talking about the data itself.
You're wrong. Non-repudiation ensures that a party cannot deny the authenticity or origin of a message, action, or transaction. So a digital signature for example, or in this case a chain of custody.
I would go with D. logging everyone in contact. While a hash function like C. would grant integrity, it only partially grants non-repudiation. The goal of non-repudiation measures is to ensure that no one can alter a claim previously made (example: digital signature proving someone sent data. They cannot deny that they sent the data because their digital signature was on the transmission.) In this case, answer D. grants non-repudiation because the logs of everyone in contact are proof of that interaction and cannot be refuted after the fact. C would only prove data was not altered.
A report or log made by a human is not a hard evidence, since you can just easily log false information.
A signature created via cryptographic technology is impossible to crack or alter.
The answer is C.
A chain of custody or log is non-repudiation. By your same logic, someone could alter the data before hashing the data as well. No system is perfect. The answer is D.
The answer is D. Logging everyone in contact with evidence.
The question is "Which of the following supplies non-repudiation during a forensics investigation?" Think wholistically about all the artifacts involved in the investigation, not only hard disks. what about dvds u discover in an office drawer? u cant hash a dvd. You will need a chain of custody to prove non-repudiation for all the artifacts collected from an office. Else the judge will toss the case.
It's D. Using a SHA-2 signature of a drive image: This helps ensure the integrity of the copied data, but it doesn't necessarily prove who created the copy.
The option that supplies non-repudiation during a forensics investigation is:
C. Using a SHA-2 signature of a drive image.
A SHA-2 signature is a cryptographic hash generated from the drive image, which serves as a unique and verifiable identifier of the image's contents. By generating a SHA-2 signature of the drive image, investigators can ensure the integrity of the evidence and provide non-repudiation, meaning that the integrity and authenticity of the evidence cannot be denied by the parties involved. This helps establish the credibility of the forensic investigation findings and ensures that the evidence has not been tampered with.
unsure incorrectcorrect
Law enforcement has acquired a disk as evidence and copied the disk for analysis. Suggest a way to maximize the integrity of the analysis process to ensure non-repudiation is possible. (Select all that apply.)
CORRECT ANSWER:
Create a hash before and after analysis and compare the checksums.
Use a write blocker during analysis to prevent data from being changed.
The definition of non-repudiation is: undeniable evidence that a specific action was performed by a particular individual or entity. There's only 1 answer that fits this definition
C. Using a SHA-2 signature of a drive image
Creating a SHA-2 signature involves generating a hash value for the drive image, and any changes to the image would result in a different hash value.
This is a forensics investigation and to me sounds like a much broader scope than data handling/processing where in that case I'd vote for C. But I think the answer is D since the question does not mention anything specific to data.
This section is not available anymore. Please use the main Exam Page.SY0-601 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
atrax
Highly Voted 2 years, 6 months agoklinkklonk
1 year, 3 months agoKurt43
1 year, 7 months agoRawToast
Highly Voted 2 years, 6 months agoAfel_Null
1 year, 7 months agoklinkklonk
1 year, 3 months agoSandon
2 years, 3 months agogho5tface
1 year, 8 months agoAlcpt
Most Recent 6 months, 4 weeks agoAlcpt
8 months agoMALEKMALAHI
10 months agoAspiringNerd
1 year agoadam.regula91
1 year agoImjusthere00
1 year, 1 month agoxihjr
1 year, 1 month agoZiareKing
1 year, 2 months agoklinkklonk
1 year, 3 months agoHs1208
1 year, 3 months agoRr_Jay
1 year, 4 months agomaggie22
1 year, 4 months agoElromon
1 year, 4 months agoMartyByrde
1 year, 5 months agoG_logic44
1 year, 5 months ago