During data acquisition, you should typically work on a duplicated copy rather than the original to preserve evidence.

Prepare for the Computer Hacking Forensic Investigator v11 exam. Study with flashcards and multiple choice questions. Each question includes hints and explanations. Get exam-ready efficiently!

Multiple Choice

During data acquisition, you should typically work on a duplicated copy rather than the original to preserve evidence.

Explanation:
Preserving evidentiary integrity during data acquisition means you should work on a duplicated copy of the media rather than the original. The standard approach is to create a forensically sound bit-for-bit image of the source, use a write blocker to prevent any writes to the original, and verify the copy with cryptographic hashes (like MD5 or SHA-256) to confirm it’s an exact replica. All analysis then occurs on the copy, while the original is kept untouched and securely stored with documented chain of custody. This ensures the evidence remains unaltered, allows repeatable and auditable examination, and supports admissibility in court. It’s not limited to emergencies—touching the original would risk modifying data and undermining the investigation.

Preserving evidentiary integrity during data acquisition means you should work on a duplicated copy of the media rather than the original. The standard approach is to create a forensically sound bit-for-bit image of the source, use a write blocker to prevent any writes to the original, and verify the copy with cryptographic hashes (like MD5 or SHA-256) to confirm it’s an exact replica. All analysis then occurs on the copy, while the original is kept untouched and securely stored with documented chain of custody. This ensures the evidence remains unaltered, allows repeatable and auditable examination, and supports admissibility in court. It’s not limited to emergencies—touching the original would risk modifying data and undermining the investigation.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy