Which of the following command-line utilities is capable of making a forensic image of a hard disk, assuming that a valid form of write-protection is in place?
a. COPY
b. XCOPY
c. MOVE
d. DD
d.
Computer Science & Information Technology
You might also like to view...
Many outgoing email servers use ____ as a set of rules for communicating with other computers.
A. HTML B. ISP C. POP D. SMTP
Computer Science & Information Technology
To create a top-values query, use the Top Values box on the Design tab to change the number of records to be included from All to the desired number.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Mapping open ports and grabbing banners are part of what attack phase?
What will be an ideal response?
Computer Science & Information Technology
The base case for a recursive definition of the factorial of n is ______.
a. factorial (–1) b. factorial (0) c. factorial (n) d. factorial (n – 1)
Computer Science & Information Technology