1. To preserve digital evidence, an investigator should ________.
make two copies of each evidence item using a single imaging tool
make a single copy of each evidence item using an approved imaging tool
make two copies of each evidence item using different imaging tools
store only the original evidence item
2. Bob was asked to make a copy of all the evidence from the compromised system. Melanie did a DOS copy of all the files on the system. What would be the primary reason for you to recommend for or against using a disk-imaging tool?
A disk-imaging tool would check for internal self-checking and validation and have an MD5 checksum.
The evidence file format will contain case data entered by the examiner and encrypted at the beginning of the evidence file.
A simple DOS copy will not include deleted files, file slack, and other information.
There is no case for an imaging tool because it will use a closed, proprietary format that if compared with the original will not match up sector for sector.
3. It takes ___________ occurrence(s) of overextending yourself during testimony to ruin your reputation.
only one if it is a major case
several
only one
at least two
4. The MD5 message-digest algorithm is used to ________.
wipe magnetic media before recycling it
make directories on an evidence disk
view graphics files on an evidence drive
hash a disk to verify that a disk is not altered when you examine it
5. You should make at least two bitstream copies of a suspect drive.
True
False
6. What is the purpose of hashing a copy of a suspect drive?
To make it secure
To remove viruses
To check for changes
To render it read-only
7. What is the most important reason that you not touch the actual original evidence any more than you have to?
Each time you touch digital data, there is some chance of altering it.
You might be accused of planting evidence.
You might accidentally decrypt files.
It can lead to data degradation.