Which of the following is the first step when using Linux to create a forensic copy?

A) Use the delete command on the suspect machine to start the copy.
B) Completely wipe the target drive.
C) Obtain a hash of the suspect drive.
D) Use netcat to set up the target forensic server.

B) Completely wipe the target drive.

Computer Science & Information Technology

You might also like to view...

______________ clouds are proprietary data centers that integrate servers, storage, networks, data, and applications.

A. Hybrid B. Private C. Public D. Vertical

Computer Science & Information Technology

What is the purpose of sharing threat intelligence?

A. Remove all private ownership of intellectual property. B. Equip other organizations to handle a looming security concern. C. Prevent lawsuits based on retaining proprietary information. D. Misdirect attackers into thinking their exploit is universally blocked.

Computer Science & Information Technology