Which of the following can be used to make a forensic copy?

a. Access Data FTK
b. Guidance Software EnCase
c. Linux dd command
d. Any of the above


ANS: A

Computer Science & Information Technology

You might also like to view...

Once the top-down design approach is taken, the ________ approach is useful in programming.

A) modular B) system-wide C) feedback D) database design

Computer Science & Information Technology

Files with a particular extension can be searched even though the extension is hidden

Indicate whether the statement is true or false

Computer Science & Information Technology

The ________ tool changes text from one language to another

A) Review B) Language C) Translate D) Thesaurus

Computer Science & Information Technology

Combining the contents of two or more fields is called ____.

A. commingling B. collaboration C. concatenation D. codification

Computer Science & Information Technology