Explain the validation of evidence data process.
What will be an ideal response?
ANSWER: Validation and verification functions work hand in hand. Validation is a way to confirm that a tool is functioning as intended, and verification proves that two sets of data are identical by calculating hash values or using another similar method. How data hashing is used depends on the investigation, but using a hashing algorithm on the entire suspect drive and all its files is a standard practice. This method produces a unique hexadecimal value for ensuring that the original data hasn’t changed and copies are of the same unchanged data or image.
You might also like to view...
Which of the following returns the fourth character in the string variable named str and checks if there is a fourth character in the string?
a. str(3); b. str.at(3); c. str[3]; d. All of the above
A predefined set of formats that can be applied text, a paragraph, a table cell, or a list is a ________
A) prototype B) font C) style D) template
What are the two major activities into which the InfoSec measurement development process recommended by NIST is divided?
What will be an ideal response?
When you are editing a footer, the Header & Footer Tools Design tab, which is normally not visible, displays. This is an example of a ________ tab
A) contextual B) quick access C) mini D) dynamic