EC-Council: Computer Hacking Forensic Investigator(CHFI-V10)
Module 4 : Data Acquisition and Duplication
         
Questions available : 33 You are not logged in.
Please Login for track your learning progress
   
 
Q. No: 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 |
Go to Question No.



Question No 0


If you want to share the link of this question, please click here to "Copy Question Link" and share that generated link. Link from URL may change in future.
 

   
Bookmark this Question
QID: 656  
   
What technique used by Encase makes it virtually impossible to tamper with evidence once it has been acquired?


 
A:    Every byte of the file(s) is given an MD5 hash to match against a master file
 
B:    Every byte of the file(s) is verified using 32-bit CRC
C:    Every byte of the file(s) is copied to three different hard drives
 
D:    Every byte of the file(s) is encrypted using three different methods
 
         

 
 

Diffence opinion in Correct Answer or any comment?
Vote / Comment for correct Answer



Comunity Comments:

Krishna on 24/03/2025
Opted Answer: A
ENCASE generated an MD5 hash for each file to ensure integrity

















WELCOME TO ONLINE EXAM PREPARATION SYSTEM

Certification Examinations