During an incident response, a security analyst has identified a server that may have been compromised. The analyst decides to take an image of the server's hard drive for further analysis. Which of the following is the MOST critical step to ensure the integrity of the investigation?
You selected this option
Generate a digital hash of the server's hard drive image.
You selected this option
Physically secure the server to prevent further access.
You selected this option
Document the process and the individuals involved in handling the server.
You selected this option
Limit access to the server by updating access control lists.
Creating a digital hash of the hard drive image is critical to maintain the integrity of the investigation. Hashing the image ensures that an investigator can verify that the evidence has not been altered from the time of acquisition. This process establishes a unique digital fingerprint for the data at the moment of capture, which can be compared against the data at any point afterward to confirm that it remains unaltered. Physically securing the server and limiting access to the server are important, but they do not address the integrity of the digital evidence after its acquisition. Documenting the process is also essential but secondary to securing the image's integrity through hashing.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a digital hash and how does it work?
Open an interactive chat with Bash
Why is it important to ensure the integrity of digital evidence during an investigation?
Open an interactive chat with Bash
What steps should be taken to properly document the incident response process?