Which of the follow...
 
Notifications
Clear all

Which of the following should be performed to accomplish this task?

1 Posts
1 Users
0 Likes
355 Views
(@kossmangonzalo)
Noble Member
Joined: 2 years ago
Posts: 715
Topic starter  

A security modern may have occurred on the desktop PC of an organization's Chief Executive Officer (CEO) A duplicate copy of the CEO's hard drive must be stored securely to ensure appropriate forensic processes and the chain of custody are followed.

Which of the following should be performed to accomplish this task?

  • A . Install a new hard drive in the CEO's PC, and then remove the old hard drive and place it in a tamper-evident bag
  • B . Connect a write blocker to the hard drive Then leveraging a forensic workstation, utilize the dd command m a live Linux environment to create a duplicate copy
  • C . Remove the CEO's hard drive from the PC, connect to the forensic workstation, and copy all the contents onto a remote fileshare while the CEO watches
  • D . Refrain from completing a forensic analysts of the CEO's hard drive until after the incident is confirmed, duplicating the hard drive at this stage could destroy evidence

Show Answer Hide Answer

Suggested Answer: B

Explanation:

“To obtain a forensically sound image from nonvolatile storage, you need to ensure that nothing you do alters data or metadata (properties) on the source disk or file system. A write blocker assures this process by preventing any data on the disk or volume from being changed by filtering write commands at the driver and OS level. Data acquisition would normally proceed by attaching the target device to a forensics workstation or field capture device equipped with a write blocker.”

For purposes of knowing, https://security.opentext.com/tableau/hardware/details/t8u write blockers like this are the most popular hardware blockers

   
Quote

Latest CompTIA SY0-601 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: