Which of the following can be used to make a forensic copy?
a. Access Data FTK
b. Guidance Software EnCase
c. Linux dd command
d. Any of the above
ANS: A
Computer Science & Information Technology
You might also like to view...
Once the top-down design approach is taken, the ________ approach is useful in programming.
A) modular B) system-wide C) feedback D) database design
Computer Science & Information Technology
Files with a particular extension can be searched even though the extension is hidden
Indicate whether the statement is true or false
Computer Science & Information Technology
The ________ tool changes text from one language to another
A) Review B) Language C) Translate D) Thesaurus
Computer Science & Information Technology
Combining the contents of two or more fields is called ____.
A. commingling B. collaboration C. concatenation D. codification
Computer Science & Information Technology