Which capability is listed for OS Forensics?

Study for the EC-Council Certified Security Specialist (ECSS) Test. Enhance your skills with flashcards and multiple-choice questions; each question provides hints and explanations. Prepare confidently for your exam!

Multiple Choice

Which capability is listed for OS Forensics?

Explanation:
Hash matching is a core capability for OS Forensics. It involves generating cryptographic hashes (like MD5, SHA-1, or SHA-256) for files and then comparing those hashes to known databases of legitimate or malicious file fingerprints. This lets investigators quickly identify suspicious or known-malicious files, confirm file integrity, and spot duplicates across large datasets without manually inspecting every item. The other options describe activities that aren’t typical forensic analysis features—cloud data migration is about moving data to or between clouds, social engineering campaigns are about manipulating people, and real-time antivirus scanning is a live protection function rather than evidence examination.

Hash matching is a core capability for OS Forensics. It involves generating cryptographic hashes (like MD5, SHA-1, or SHA-256) for files and then comparing those hashes to known databases of legitimate or malicious file fingerprints. This lets investigators quickly identify suspicious or known-malicious files, confirm file integrity, and spot duplicates across large datasets without manually inspecting every item. The other options describe activities that aren’t typical forensic analysis features—cloud data migration is about moving data to or between clouds, social engineering campaigns are about manipulating people, and real-time antivirus scanning is a live protection function rather than evidence examination.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy