Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam 212-89 Topic 3 Question 69 Discussion

Actual exam question for Eccouncil's 212-89 exam
Question #: 69
Topic #: 3
[All 212-89 Questions]

An attacker after performing an attack decided to wipe evidences using artifact wiping techniques to evade forensic investigation. He applied magnetic field to the digital

media device, resulting in an entirely clean device of any previously stored data.

Identify the artifact wiping technique used by the attacker.

Show Suggested Answer Hide Answer
Suggested Answer: B

The technique described, where an attacker applies a magnetic field to a digital media device to clean it of any previously stored data, is known as disk degaussing. Degaussing is a method used to erase a disk or tape by exposing it to a strong magnetic field, destroying the magnetic data storage mechanism and leaving the device clean of any data. This process is effectively used for wiping digital evidence in a way that makes recovery impossible, serving as a method of anti-forensics. Unlike file wiping utilities or disk cleaning utilities, which overwrite or delete data (potentially leaving traces that can be recovered), degaussing physically alters the storage medium itself, making data recovery unfeasible. Reference: The ECIH v3 certification program discusses various artifact wiping techniques, including degaussing, as part of understanding anti-forensic methods that attackers use to evade detection and investigation.


Contribute your Thoughts:

Cathrine
2 months ago
Ha! This attacker must have watched too many spy movies. Wiping a device with a magnetic field? Talk about overkill. B is the answer, but I bet they're the type to use a sledgehammer to crack a nut.
upvoted 0 times
...
Lachelle
2 months ago
B, no doubt. Whoever this attacker is, they really know their stuff. Degaussing is the nuclear option when it comes to data destruction. Gotta respect the dedication to leaving no evidence behind.
upvoted 0 times
...
Earleen
2 months ago
Hmm, I'm torn between B and C. Disk cleaning utilities could also do the trick, but the question specifically mentions a magnetic field, so I'm leaning towards B. Better safe than sorry, right?
upvoted 0 times
...
Jerilyn
2 months ago
I'm going with B as well. Wiping a device with a magnetic field is a classic tactic used by the pros to cover their tracks. No trace left behind, just a clean slate.
upvoted 0 times
...
Adelina
2 months ago
Definitely B. Disk degaussing is the only way to completely wipe all data from a device. That's some serious James Bond-level stuff right there!
upvoted 0 times
Dolores
17 days ago
Yeah, disk degaussing is definitely the way to go for complete data wiping.
upvoted 0 times
...
Marva
18 days ago
I've heard that even file wiping utilities can leave traces behind.
upvoted 0 times
...
Kallie
28 days ago
It's like something out of a spy movie, very high-tech.
upvoted 0 times
...
Linwood
1 months ago
I agree, disk degaussing is the most effective way to wipe all data.
upvoted 0 times
...
...
Alishia
2 months ago
B is the right answer, no doubt. Though I wonder if the attacker considered using a hammer instead - they could have really 'smashed' the evidence that way.
upvoted 0 times
Renea
25 days ago
C) Disk cleaning utilities
upvoted 0 times
...
Leatha
29 days ago
B) Disk degaussing/destruction
upvoted 0 times
...
Jimmie
1 months ago
A) File wiping utilities
upvoted 0 times
...
...
Belen
2 months ago
Haha, I bet the attacker is kicking themselves for not using a microwave oven instead. That would have been a more 'shocking' way to wipe the evidence!
upvoted 0 times
Renea
29 days ago
C) Disk cleaning utilities
upvoted 0 times
...
Annabelle
1 months ago
B) Disk degaussing/destruction
upvoted 0 times
...
Shakira
1 months ago
A) File wiping utilities
upvoted 0 times
...
...
Talia
2 months ago
I'm not sure, but I think disk cleaning utilities could also be used for artifact wiping.
upvoted 0 times
...
Michal
2 months ago
I agree with Raul, disk degaussing/destruction would completely wipe the device.
upvoted 0 times
...
Raul
2 months ago
I think the attacker used disk degaussing/destruction.
upvoted 0 times
...
Hector
3 months ago
I'm going with B as well. Applying a strong magnetic field is a classic technique for erasing data beyond recovery.
upvoted 0 times
Malinda
1 months ago
Definitely the most effective method to ensure no traces are left behind.
upvoted 0 times
...
Detra
1 months ago
B) Disk degaussing/destruction
upvoted 0 times
...
Kayleigh
1 months ago
I agree, using a strong magnetic field is a sure way to wipe out all data.
upvoted 0 times
...
Roosevelt
1 months ago
B) Disk degaussing/destruction
upvoted 0 times
...
Tasia
1 months ago
D) Syscall proxying
upvoted 0 times
...
Moon
1 months ago
C) Disk cleaning utilities
upvoted 0 times
...
Alpha
2 months ago
B) Disk degaussing/destruction
upvoted 0 times
...
Pearly
2 months ago
A) File wiping utilities
upvoted 0 times
...
...
Valentine
3 months ago
Definitely B. Disk degaussing is the only way to completely wipe all data from a device. Anything else would leave traces behind.
upvoted 0 times
Ressie
2 months ago
Syscall proxying is not a method used for artifact wiping.
upvoted 0 times
...
Ming
2 months ago
File wiping utilities may not completely erase all traces of data.
upvoted 0 times
...
Desmond
2 months ago
Yes, disk degaussing destroys all data by applying a strong magnetic field.
upvoted 0 times
...
Elli
2 months ago
I agree, disk degaussing is the most effective way to wipe all data.
upvoted 0 times
...
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77