Which capability is listed for OS Forensics?

Prepare for the EC-Council Certified Security Specialist Exam with our comprehensive quiz. Enhance your understanding through flashcards and multiple-choice questions complete with hints and explanations. Boost your exam confidence today!

Multiple Choice

Which capability is listed for OS Forensics?

Explanation:
Hash matching is a core capability for OS Forensics. It involves generating cryptographic hashes (like MD5, SHA-1, or SHA-256) for files and then comparing those hashes to known databases of legitimate or malicious file fingerprints. This lets investigators quickly identify suspicious or known-malicious files, confirm file integrity, and spot duplicates across large datasets without manually inspecting every item. The other options describe activities that aren’t typical forensic analysis features—cloud data migration is about moving data to or between clouds, social engineering campaigns are about manipulating people, and real-time antivirus scanning is a live protection function rather than evidence examination.

Hash matching is a core capability for OS Forensics. It involves generating cryptographic hashes (like MD5, SHA-1, or SHA-256) for files and then comparing those hashes to known databases of legitimate or malicious file fingerprints. This lets investigators quickly identify suspicious or known-malicious files, confirm file integrity, and spot duplicates across large datasets without manually inspecting every item. The other options describe activities that aren’t typical forensic analysis features—cloud data migration is about moving data to or between clouds, social engineering campaigns are about manipulating people, and real-time antivirus scanning is a live protection function rather than evidence examination.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy