Validating data integrity-commonly performed by calculating and recording cryptographic hash values-proves that the evidence has not been altered between collection and later analysis. This safeguards the chain of custody and ensures that the data will be admissible and reliable in legal or internal investigations. The other options describe activities (compressing files, skipping sectors, or bypassing documentation) that either undermine evidence reliability or have no impact on it, so they are incorrect.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a cryptographic hash, and how does it help ensure data integrity?
Open an interactive chat with Bash
What is the chain of custody, and why is it important in incident response?
Open an interactive chat with Bash
Why is skipping redundant sectors during imaging not a best practice?