Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA Exam CAS-004 Topic 2 Question 68 Discussion

Actual exam question for CompTIA's CAS-004 exam
Question #: 68
Topic #: 2
[All CAS-004 Questions]

Which of the following is the best reason for obtaining file hashes from a confiscated laptop?

Show Suggested Answer Hide Answer
Suggested Answer: B

File hashing is used to create a digital fingerprint of files to detect unauthorized changes. By comparing the hash values before and after analysis, the integrity of the files can be validated. This aligns with CASP+ objective 5.2, which includes forensic evidence integrity and validation methods.


Contribute your Thoughts:

Ira
3 months ago
Option B is the best choice, no doubt. I'd also suggest keeping a sense of humor - maybe the laptop was used to write a comedy routine. 'Knock, knock. Who's there? Your files have been tampered with!'
upvoted 0 times
Milly
2 months ago
D) To preserve the chain of custody of files
upvoted 0 times
...
Art
2 months ago
A) To prevent metadata tampering on each file
upvoted 0 times
...
Alyce
2 months ago
B) To later validate the integrity of each file
upvoted 0 times
...
...
Elliot
3 months ago
While the other options have their merits, Option B is the most relevant and important for this scenario. Gotta keep that chain of custody tight!
upvoted 0 times
...
Blossom
3 months ago
I think C) To generate unique identifiers for each file is also a valid reason, to track each file individually.
upvoted 0 times
...
Rebecka
3 months ago
I agree with Celestine. Maintaining the integrity of the evidence is paramount. Option B is the clear winner here.
upvoted 0 times
Bernardine
2 months ago
Exactly, maintaining the chain of custody is crucial in investigations.
upvoted 0 times
...
Marsha
2 months ago
That way we can ensure the evidence hasn't been tampered with.
upvoted 0 times
...
Adelle
2 months ago
It's important to be able to validate the integrity of each file later on.
upvoted 0 times
...
Lou
2 months ago
I agree, option B is definitely the best reason for obtaining file hashes.
upvoted 0 times
...
...
Michael
3 months ago
I agree with Allene, it's important to ensure the files haven't been altered.
upvoted 0 times
...
Allene
3 months ago
B) To later validate the integrity of each file
upvoted 0 times
...
Celestine
3 months ago
Option B is definitely the way to go. Validating the integrity of each file is crucial for any forensic investigation.
upvoted 0 times
Jennifer
2 months ago
Generating unique identifiers for each file can also help in tracking and organizing the evidence.
upvoted 0 times
...
Martha
2 months ago
It's important to prevent any tampering with the metadata on the files during the investigation.
upvoted 0 times
...
Werner
3 months ago
I agree, validating the integrity of each file is essential for maintaining the chain of custody.
upvoted 0 times
...
...

Save Cancel