The data acquisition process should include preserving evidence by protecting it from temperature extremes and by using controlled handling.

Prepare for the Computer Hacking Forensic Investigator v11 exam. Study with flashcards and multiple choice questions. Each question includes hints and explanations. Get exam-ready efficiently!

Multiple Choice

The data acquisition process should include preserving evidence by protecting it from temperature extremes and by using controlled handling.

Explanation:
Preserving evidence during data acquisition hinges on protecting the physical media from environmental changes and enforcing strict handling to maintain the chain of custody. Temperature extremes can cause hardware to behave unpredictably, lead to data corruption, or even cause media failure, so keeping the environment controlled helps ensure the acquired data truly reflects the original state. Controlled handling ensures only authorized personnel access the evidence, proper documentation and labeling occur, and the data remains unaltered and traceable throughout the process. The other options undermine integrity: taking copies without verifying checksums means you can’t be sure the copy matches the original exactly; unrestricted access without logging breaks the chain of custody; and modifying data to fit a narrative is manipulation and invalidates the evidence.

Preserving evidence during data acquisition hinges on protecting the physical media from environmental changes and enforcing strict handling to maintain the chain of custody. Temperature extremes can cause hardware to behave unpredictably, lead to data corruption, or even cause media failure, so keeping the environment controlled helps ensure the acquired data truly reflects the original state. Controlled handling ensures only authorized personnel access the evidence, proper documentation and labeling occur, and the data remains unaltered and traceable throughout the process.

The other options undermine integrity: taking copies without verifying checksums means you can’t be sure the copy matches the original exactly; unrestricted access without logging breaks the chain of custody; and modifying data to fit a narrative is manipulation and invalidates the evidence.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy