Validating data integrity-commonly performed by calculating and recording cryptographic hash values-proves that the evidence has not been altered between collection and later analysis. This safeguards the chain of custody and ensures that the data will be admissible and reliable in legal or internal investigations. The other options describe activities (compressing files, skipping sectors, or bypassing documentation) that either undermine evidence reliability or have no impact on it, so they are incorrect.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is data integrity important in incident response?
Open an interactive chat with Bash
What techniques are used to validate data integrity during evidence acquisition?
Open an interactive chat with Bash
What are the potential consequences of not ensuring data integrity during incident response?