Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GCIA Topic 7 Question 62 Discussion

Actual exam question for GIAC's GCIA exam
Question #: 62
Topic #: 7
[All GCIA Questions]

Which of the following methods is used by forensic investigators to acquire an image over the network in a secure manner?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Rory
5 days ago
I bet the right answer involves something that can't be 'hacked' by the suspect. Probably not the DOS boot disk!
upvoted 0 times
...
Lucina
6 days ago
Hmm, EnCase with a hardware write blocker, huh? Sounds like the forensic version of duct tape and WD-40 - it fixes Jeanninerything!
upvoted 0 times
...
Jeannine
7 days ago
B. EnCase with a hardware write blocker is the way to go. It's the gold standard for preserving data integrity.
upvoted 0 times
...
Reita
8 days ago
A. DOS boot disk? What is this, the 90s? I doubt that would work for modern forensics.
upvoted 0 times
...
Monroe
15 days ago
D. Secure Authentication for EnCase (SAFE)? Isn't that just for logging in? I don't think that qualifies as a method for network image acquisition.
upvoted 0 times
...
Jesse
1 months ago
I believe D) Secure Authentication for EnCase (SAFE) could also be a valid option for secure acquisition of images.
upvoted 0 times
...
Daisy
1 months ago
I'm not sure, but I think C) Linux Live CD could also be a secure method for acquiring an image over the network.
upvoted 0 times
...
Leigha
1 months ago
C. Linux Live CD sounds like a good option too. It's open-source and you can customize it for your forensic needs.
upvoted 0 times
Derick
21 days ago
C) Linux Live CD sounds like a good option too. It's open-source and you can customize it for your forensic needs.
upvoted 0 times
...
Freeman
25 days ago
B) EnCase with a hardware write blocker
upvoted 0 times
...
...
Lelia
2 months ago
I think the answer is B. EnCase with a hardware write blocker. That's the industry standard for secure network image acquisition.
upvoted 0 times
Rodolfo
8 days ago
Forensic investigators need to be meticulous in their approach to ensure the evidence is admissible in court.
upvoted 0 times
...
Marshall
9 days ago
It's important to follow proper forensic procedures to maintain the integrity of the evidence.
upvoted 0 times
...
Melissa
11 days ago
I've heard that Secure Authentication for EnCase (SAFE) is another secure method for acquiring images over the network.
upvoted 0 times
...
Eulah
12 days ago
Using EnCase with a hardware write blocker ensures that the original evidence is not altered during the acquisition process.
upvoted 0 times
...
Kyoko
23 days ago
EnCase with a hardware write blocker is definitely the most reliable option for forensic investigators.
upvoted 0 times
...
Brandon
23 days ago
I agree, B) EnCase with a hardware write blocker is the best option for secure network image acquisition.
upvoted 0 times
...
Kirk
25 days ago
I think Linux Live CD could also be a secure method for network image acquisition.
upvoted 0 times
...
Raul
1 months ago
I agree, using EnCase with a hardware write blocker ensures the integrity of the acquired image.
upvoted 0 times
...
...
Wei
2 months ago
I agree with Darci, using a hardware write blocker ensures the image is acquired securely.
upvoted 0 times
...
Darci
2 months ago
I think the answer is B) EnCase with a hardware write blocker.
upvoted 0 times
...

Save Cancel