Which of the following can be used to make a forensic copy?
a. Access Data FTK
b. Guidance Software EnCase
c. Linux dd command
d. Any of the above
ANS: A
Computer Science & Information Technology
You might also like to view...
How can you reduce the file size of a PDF document?
What will be an ideal response?
Computer Science & Information Technology
Which of the following protocols is often used for data compression, digital signing, encryption and decryption of messages, emails, files, and directories as well as to enhance the privacy of email communications?
A. EAP B. PGP C. CHAP D. HMAC
Computer Science & Information Technology