Which of the following is the first step when using Linux to create a forensic copy?
a. Use the dd command on the suspect machine to start the copy.
b. Completely wipe the target drive.
c. Obtain a hash of the suspect drive.
d. Use netcat to set up the target forensic server.
ANS: B
You might also like to view...
Case 2Brandon works for a large construction firm in the Northeast. Brandon was hired for his excellent skills in web design, specifically his experience with Dreamweaver. Brandon is eager to put his experience and skills to good use. Brandon begins uploading files to the remote server. He continues to work in Dreamweaver. What function is not available during the uploading process?
A. Create a new page B. Add files and folders C. Check In/Check out feature D. Run reports
Relational operators compare ____ values and produce an appropriate true or false value.
A. two B. three C. four D. five