Describe the steps that must be taken to create image file?s.

What will be an ideal response?


You use the following steps to create image files:Copy all image files to a large drive. Start your forensics tool to access and open the image files.Run an MD5 or SHA-1 hashing algorithm on the image files to get a digital hash. When you finish copying image files to a larger drive, secure the original media in an evidence locker. Don't work with the original media; it should be stored in a locker that has an evidence custody form. Be sure to fill out the form and date it.?

Computer Science & Information Technology

You might also like to view...

Which of the following types of password prevents a user from accessing privileged exec mode on a Cisco router?

A. console B. AUX C. enable D. TTY

Computer Science & Information Technology

There are security risks using the $_REQUEST autoglobal because it includes the contents of the ____ autoglobal as well as the $_GET and $_POST autoglobals.

A. $_COOKIES B. $_ENV C. $_FILES D. $_COOKIE

Computer Science & Information Technology

Hash algorithms like MD5 and SHA are considered secure for creating digests because these hashing algorithms are designed to create a digest as strong as possible.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

To add the Business Analyst and Client tables to the Relationships window shown in the accompanying figure, click the Add button in the ___________________ dialog box.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology