PrepAway - Latest Free Exam Questions & Answers

which of the following steps should be performed FIRST?

To ensure proper evidence collection, which of the following steps should be performed FIRST?

PrepAway - Latest Free Exam Questions & Answers

A.
Take hashes from the live system

B.
Review logs

C.
Capture the system image

D.
Copy all compromised files

Explanation:
Capturing an image of the operating system in its exploited state can be helpful in revisiting the issue after the fact to learn more about it. This is essential since the
collection of evidence process may result in some mishandling and changing the exploited state.

Incorrect Answers:
A: Hashes helps to be able to illustrate the situation and should be done prior to an incident where evidence is to be collected. NIST (the National Institute of
Standards and Technology) maintains a National Software Reference Library (NSRL). One of the purposes of the NSRL is to collect “known, traceable software
applications” through their hash values and store them in a Reference Data Set (RDS). The RDS can then be used by law enforcement, government agencies, and
businesses to determine which files are important as evidence in criminal investigations. However, according to the order of volatility the first task should be to
capture the system image.
B: Review logs are part of collection of evidence, but in order of volatility it comes into the equation after system images have been captured.
D: You first need to know which files were compromised to be able to copy compromised files.

Dulaney, Emmett and Chuck Eastton, CompTIA Security+ Study Guide, Sixth Edition, Sybex, Indianapolis, 2014, pp 453-454


Leave a Reply