List of questions
Related questions
Question 962 - CISA discussion
An IS auditor is supporting a forensic investigation. An image of affected storage media has been captured while collecting digital forensic evidence. Which of the following techniques would BEST enable an IS auditor to verify that the captured image is an exact, unchanged replica of the original media?
A.
Hash value
B.
Access control list
C.
File allocation table
D.
Size of the file
Your answer:
0 comments
Sorted by
Leave a comment first