ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 304 - SY0-601 discussion

Report
Export

A systems analyst is responsible for generating a new digital forensics chain -of- custody form Which of the following should the analyst include in this documentation? (Select two).

A.
The order of volatility
Answers
A.
The order of volatility
B.
A forensics NDA
Answers
B.
A forensics NDA
C.
The provenance of the artifacts
Answers
C.
The provenance of the artifacts
D.
The vendor's name
Answers
D.
The vendor's name
E.
The date and time
Answers
E.
The date and time
F.
A warning banner
Answers
F.
A warning banner
Suggested answer: C, E

Explanation:

A digital forensics chain-of-custody form is a document that records the chronological and logical sequence of custody, control, transfer, analysis, and disposition of digital evidence. A digital forensics chain-of-custody form should include the following information:

The provenance of the artifacts: The provenance of the artifacts refers to the origin and history of the digital evidence, such as where, when, how, and by whom it was collected, handled, analyzed, or otherwise controlled.

The date and time: The date and time refer to the specific moments when the digital evidence was collected, handled, analyzed, transferred, or disposed of by each person involved in the chain of custody.

Other information that may be included in a digital forensics chain-of-custody form are:

The identification of the artifacts: The identification of the artifacts refers to the unique identifiers or labels assigned to the digital evidence, such as serial numbers, barcodes, hashes, or descriptions. The signatures of the custodians: The signatures of the custodians refer to the names and signatures of each person who had custody or control of the digital evidence at any point in the chain of custody.

The location of the artifacts: The location of the artifacts refers to the physical or logical places where the digital evidence was stored or processed, such as a lab, a server, a cloud service, or a device.

Reference: https://www.comptia.org/certifications/security#examdetails https://www.comptia.org/content/guides/comptia-security-sy0-601-exam-objectives https://resources.infosecinstitute.com/topic/chain-of-custody-in-digital-forensics/

asked 02/10/2024
Zden Bohm Autocont a.s.
27 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first