Which of the following commands can be used to obtain a hash of the original drive and the forensic copy?

a. dd
b. netcat
c. md5sum
d. nc


ANS: C

Computer Science & Information Technology

You might also like to view...

The expr argument is used to enter a logical ________ into the IIF function

Fill in the blank(s) with correct word

Computer Science & Information Technology

When cropping an image, the outline of the picture indicates the portion of the picture that remains

Indicate whether the statement is true or false

Computer Science & Information Technology

The currency symbol is aligned to the left side of the cell in the ________ format

A) Currency B) Number C) Accounting Number D) General

Computer Science & Information Technology

The ________ function in Excel is one method that can help with creating a random sample

A) SAMPLE B) RANDOM C) RAND D) SAMP

Computer Science & Information Technology