Which of the following can be used to make a forensic copy?

a. Access Data FTK
b. Guidance Software EnCase
c. Linux dd command
d. Any of the above

ANS: A

Computer Science & Information Technology

You might also like to view...

How can you reduce the file size of a PDF document?

What will be an ideal response?

Computer Science & Information Technology

Which of the following protocols is often used for data compression, digital signing, encryption and decryption of messages, emails, files, and directories as well as to enhance the privacy of email communications?

A. EAP B. PGP C. CHAP D. HMAC

Computer Science & Information Technology