You may use Linux to make a ______________ of the hard drive
a. Bootable copy
b. Screen shot
c. New version
d. Forensically valid copy
Answer D. Two Linux versions are Knoppix and Backtrack.
You might also like to view...
Let X be a node in a binary tree. Any node on the path from X to the root is called
A) a descendant of X B) an ancestor of X C) a superior of X D) a subordinate of X
There are two reserved button names that have assigned meanings: Submit and Reset.
Answer the following statement true (T) or false (F)
The array_search() function determines whether a given value exists in an array and returns the negative value of the first matching element is it exists or false if it does not exist.
Answer the following statement true (T) or false (F)
Any action that threatens one or more of the classic security services of confidentiality, integrity, availability, accountability, authenticity, and reliability in a system constitutes a(n) ________.
Fill in the blank(s) with the appropriate word(s).