Megan needs to create a forensic copy of a hard drive that will be used in an investigation. Which of the following tools is best suited to her work?

A. xcopy
B. dd
C. DBAN
D. ImageMagik

Answer: B. dd

Computer Science & Information Technology

You might also like to view...

ISO details a model process for managing information security that comprises the following steps: plan, do, ________, and act.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Software is often created under the constraints of ____________________ management, placing limits on time, cost, and manpower.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology