To prove that evidence has not been altered since entering the lab, which approach is correct?

Enhance your knowledge as a Computer Hacking Forensic Investigator with the CHFI v11 Test. Use flashcards and multiple-choice questions, complete with hints and detailed explanations, to prepare effectively and ace your exam!

Multiple Choice

To prove that evidence has not been altered since entering the lab, which approach is correct?

Explanation:
Proving that evidence hasn’t been altered relies on creating a fingerprint of the exact data when it enters the lab and then keeping that fingerprint secure. You generate a cryptographic hash of the entire evidence at intake and record that digest in the chain of custody. Later, you recompute the hash on the preserved copy and compare it to the original digest. If they match, the data remain unchanged; if they differ, tampering or corruption has occurred. This method provides a concrete, verifiable artifact that can be independently checked, rather than relying on a signed statement, lab certification, or a generic standard database. In practice, hashing at intake and comparing to that original digest is the reliable way to demonstrate integrity over time, with a note that stronger hash functions (like SHA-256) are preferred over MD5 for improved collision resistance.

Proving that evidence hasn’t been altered relies on creating a fingerprint of the exact data when it enters the lab and then keeping that fingerprint secure. You generate a cryptographic hash of the entire evidence at intake and record that digest in the chain of custody. Later, you recompute the hash on the preserved copy and compare it to the original digest. If they match, the data remain unchanged; if they differ, tampering or corruption has occurred. This method provides a concrete, verifiable artifact that can be independently checked, rather than relying on a signed statement, lab certification, or a generic standard database. In practice, hashing at intake and comparing to that original digest is the reliable way to demonstrate integrity over time, with a note that stronger hash functions (like SHA-256) are preferred over MD5 for improved collision resistance.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy