Which of the following is the first step when using Linux to create a forensic copy?

a. Use the dd command on the suspect machine to start the copy.
b. Completely wipe the target drive.
c. Obtain a hash of the suspect drive.
d. Use netcat to set up the target forensic server.


ANS: B

Computer Science & Information Technology

You might also like to view...

List files in your home directory that are larger than 6 blocks

What will be an ideal response?

Computer Science & Information Technology

CSS is somewhat problematic because it provides fewer design and formatting capabilities than are available with standard HTML and XHTML elements and attributes.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

____ is the Excel default function for data fields containing numbers.

A. COUNT B. Subtotal C. SUM D. Total

Computer Science & Information Technology

Miguel is working on a large grant and has created a curriculum vitae for one of his practice's lead investigators, and he now wants to use that profile as a template to create curriculum vitae for the rest of the team. He will change the default location for user templates then save the document as a template. How would Miguel change the default location for user templates to a new folder he has already created called "Miguel Templates"?

What will be an ideal response?

Computer Science & Information Technology