During the execution of a search warrant, you image a suspect drive using FTK Imager and store the Raw(dd) image files o
Posted: Mon Mar 14, 2022 12:04 pm
During the execution of a search warrant, you image a suspect drive using FTK Imager and store the Raw(dd) image files on a portable drive. Later, these files are transferred to a server for storage. How do you verify that the information stored on the server is unaltered?
A. open and view the Summary file
B. load the image into FTK and it automatically performs file verification
C. in FTK Imager, use the Verify Drive/Image function to automatically compare a calculatedhash with a stored hash
D. use FTK Imager to create a verification hash and manually compare that value to the valuestored in the Summary file
A. open and view the Summary file
B. load the image into FTK and it automatically performs file verification
C. in FTK Imager, use the Verify Drive/Image function to automatically compare a calculatedhash with a stored hash
D. use FTK Imager to create a verification hash and manually compare that value to the valuestored in the Summary file