Megan needs to create a forensic copy of a hard drive that will be used in an investigation. Which of the following tools is best suited to her work?
A. xcopy
B. dd
C. DBAN
D. ImageMagik
Answer: B. dd
Computer Science & Information Technology
You might also like to view...
ISO details a model process for managing information security that comprises the following steps: plan, do, ________, and act.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Software is often created under the constraints of ____________________ management, placing limits on time, cost, and manpower.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology