Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco Exam 200-201 Topic 2 Question 63 Discussion

Actual exam question for Cisco's 200-201 exam
Question #: 63
Topic #: 2
[All 200-201 Questions]

What are two differences between tampered disk images and untampered disk images'? (Choose two.)

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Vallie
2 months ago
Wait, so if I spill coffee on my hard drive, is that considered a 'tampered image'? Because if so, I'm gonna need a lot of evidence bags.
upvoted 0 times
Yuki
23 days ago
No, spilling coffee on your hard drive would not be considered a tampered image.
upvoted 0 times
...
Taryn
29 days ago
C) The image is untampered if the existing stored hash matches the computed one
upvoted 0 times
...
Lai
1 months ago
A) Tampered Images are used in a security investigation process
upvoted 0 times
...
...
Bethanie
2 months ago
Okay, let me get this straight. Untampered images are good for evidence, but tampered images are for security investigations. And here I was thinking they were all just digital boo-boos.
upvoted 0 times
...
Kristel
2 months ago
Tampered images for root cause analysis? That's like using a broken hammer to fix a broken window. I'm not sure I'm following the logic here.
upvoted 0 times
Rikki
19 hours ago
D) The image is tampered if the stored hash and the computed hash are identical
upvoted 0 times
...
Kizzy
3 days ago
Untampered images can be used as law enforcement evidence.
upvoted 0 times
...
Caitlin
4 days ago
C) The image is untampered if the existing stored hash matches the computed one
upvoted 0 times
...
King
9 days ago
A) Tampered Images are used in a security investigation process
upvoted 0 times
...
Regenia
17 days ago
B) Untampered images can be used as law enforcement evidence.
upvoted 0 times
...
Bev
19 days ago
Tampered images are not ideal for root cause analysis.
upvoted 0 times
...
Owen
1 months ago
C) The image is untampered if the existing stored hash matches the computed one
upvoted 0 times
...
Vi
2 months ago
A) Tampered Images are used in a security investigation process
upvoted 0 times
...
...
Felton
2 months ago
Ah, the old hash conundrum. If the stored hash matches the computed one, it's untampered. But if they're identical, it's tampered? This question is a mind-bender!
upvoted 0 times
...
Jenise
2 months ago
Wait, so tampered images can be used in security investigations, but untampered images can be used as evidence? I think I need to re-read this a few times to make sure I've got it straight.
upvoted 0 times
Alishia
2 months ago
B) Untampered images can be used as law enforcement evidence.
upvoted 0 times
...
Iluminada
2 months ago
A) Tampered Images are used in a security investigation process
upvoted 0 times
...
...
Alayna
2 months ago
Yes, and also, an image is considered untampered if the existing stored hash matches the computed one.
upvoted 0 times
...
Christiane
2 months ago
I agree with that, and I believe untampered images can be used as law enforcement evidence.
upvoted 0 times
...
Rasheeda
3 months ago
I think the main difference is that tampered images are used in security investigations.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77