ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 16 - ECSS discussion

Report
Export

John, a forensic officer, was working on a criminal case. He employed imaging software to create a copy of data from the suspect device on a storage medium for further investigation. For developing an image of the original data, John used a software application that does not allow an unauthorized user to alter the image content on storage media, thereby retaining an unaltered image copy.

Identify the data acquisition step performed by John in the above scenario.

A.

Validated data acquisition

Answers
A.

Validated data acquisition

B.

Planned for contingency

Answers
B.

Planned for contingency

C.

Sanitized the target media

Answers
C.

Sanitized the target media

D.

Enabled write protection on the evidence media

Answers
D.

Enabled write protection on the evidence media

Suggested answer: D

Explanation:

In digital forensics, write protection is a crucial step during data acquisition to ensure that the data being imaged cannot be altered during the process. This is essential to maintain the integrity of the evidence. John's use of imaging software that prevents unauthorized alteration indicates that he enabled write protection, which is a standard practice to safeguard the original data on storage media.

asked 24/10/2024
Michael Encarnado
34 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first