Which of the following command-line utilities is capable of making a forensic image of a hard disk, assuming that a valid form of write-protection is in place?
a. COPY
b. XCOPY
c. MOVE
d. DD
d.
Computer Science & Information Technology
You might also like to view...
Which of the following is not an example of cardholder data?
A. Primary account number B. PIN number C. Service code D. Expiration date
Computer Science & Information Technology
Which of the following are member functions of the queue adaptor template? For members of queue, specify any needed arguments.
a. size() b. empty() c. top() d. front() e. push() f. back() g. pop() h) == (i.e., overloaded operator==)
Computer Science & Information Technology