PrepAway - Latest Free Exam Questions & Answers

Which of the following is a potential problem when creating a message digest for forensic purposes?

Which of the following is a potential problem when creating a message digest for forensic purposes?

PrepAway - Latest Free Exam Questions & Answers

A.
The process is very slow.
Contains system level access control kernel.

B.
The file’s last access time is changed.
Can contain a hidden file or data.

C.
The message digest is almost as long as the data string.
“To generate a digital signature, the digital signal program passes the file to be sent through a
one-way hash function. This hash function produces a fixed size output from a variable size input.”
Pg. 208 Krutz: The CISSP Prep Guide: Gold Edition.
QUESTION 1105

A forensic examination should inspect slack space because it
Can contain vital system information.

D.
One-way hashing technology invalidates message digest processing.
Can be defeted to avoid detection.

E.
a file could be changed during the process

C.
The message digest is almost as long as the data string.
“To generate a digital signature, the digital signal program passes the file to be sent through a
one-way hash function. This hash function produces a fixed size output from a variable size input.”
Pg. 208 Krutz: The CISSP Prep Guide: Gold Edition.
QUESTION 1105

A forensic examination should inspect slack space because it
Can contain vital system information.

A.
The process is very slow.
Contains system level access control kernel.

B.
The file’s last access time is changed.
Can contain a hidden file or data.

C.
The message digest is almost as long as the data string.
“To generate a digital signature, the digital signal program passes the file to be sent through a
one-way hash function. This hash function produces a fixed size output from a variable size input.”
Pg. 208 Krutz: The CISSP Prep Guide: Gold Edition.
QUESTION 1105

A forensic examination should inspect slack space because it
Can contain vital system information.

D.
One-way hashing technology invalidates message digest processing.
Can be defeted to avoid detection.

Explanation:
Not D: does not make much sense. The purpose of the one-way hash it to create a message digest.
Not


Leave a Reply