You may use Linux to make a ______________ of the hard drive

a. Bootable copy
b. Screen shot
c. New version
d. Forensically valid copy


Answer D. Two Linux versions are Knoppix and Backtrack.

Computer Science & Information Technology

You might also like to view...

Let X be a node in a binary tree. Any node on the path from X to the root is called

A) a descendant of X B) an ancestor of X C) a superior of X D) a subordinate of X

Computer Science & Information Technology

There are two reserved button names that have assigned meanings: Submit and Reset.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The array_search() function determines whether a given value exists in an array and returns the negative value of the first matching element is it exists or false if it does not exist.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Any action that threatens one or more of the classic security services of confidentiality, integrity, availability, accountability, authenticity, and reliability in a system constitutes a(n) ________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology