Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA Exam CAS-004 Topic 2 Question 68 Discussion

Actual exam question for CompTIA's CAS-004 exam
Question #: 68
Topic #: 2
[All CAS-004 Questions]

Which of the following is the best reason for obtaining file hashes from a confiscated laptop?

Show Suggested Answer Hide Answer
Suggested Answer: B

File hashing is used to create a digital fingerprint of files to detect unauthorized changes. By comparing the hash values before and after analysis, the integrity of the files can be validated. This aligns with CASP+ objective 5.2, which includes forensic evidence integrity and validation methods.


Contribute your Thoughts:

Ira
1 days ago
Option B is the best choice, no doubt. I'd also suggest keeping a sense of humor - maybe the laptop was used to write a comedy routine. 'Knock, knock. Who's there? Your files have been tampered with!'
upvoted 0 times
...
Elliot
4 days ago
While the other options have their merits, Option B is the most relevant and important for this scenario. Gotta keep that chain of custody tight!
upvoted 0 times
...
Blossom
6 days ago
I think C) To generate unique identifiers for each file is also a valid reason, to track each file individually.
upvoted 0 times
...
Rebecka
6 days ago
I agree with Celestine. Maintaining the integrity of the evidence is paramount. Option B is the clear winner here.
upvoted 0 times
...
Michael
9 days ago
I agree with Allene, it's important to ensure the files haven't been altered.
upvoted 0 times
...
Allene
10 days ago
B) To later validate the integrity of each file
upvoted 0 times
...
Celestine
13 days ago
Option B is definitely the way to go. Validating the integrity of each file is crucial for any forensic investigation.
upvoted 0 times
Werner
3 days ago
I agree, validating the integrity of each file is essential for maintaining the chain of custody.
upvoted 0 times
...
...

Save Cancel