When acquiring evidence, what can you use to validate that data and applications were not modified after analysis?

IT Questions BankCategory: Cybersecurity EssentialsWhen acquiring evidence, what can you use to validate that data and applications were not modified after analysis?

When acquiring evidence, what can you use to validate that data and applications were not modified after analysis?

  • Network and traffic logs
  • Hashes or checksums of data
  • Time offset data

Explanation: Hashes or checksums of all data and applications before and after any analysis, to validate that they were not modified.

More Questions: Cybersecurity Essentials Module 6 Quiz Answers


guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x