In order to make a forensically sound copy of a hard disk for analysis, it is critical that you employ a write-blocker. What does this device do that makes for a sound copy?
a. It performs bit by bit error correction of each sector of the source hard disk as it is copied to the target medium.
b. It prevents rootkits from destroying the data when it detects the lauch of a copy routine.
c. It prevents the OS from making any changes to the metadata of files as they are being copied.
d. It is capable of reading the system files that are generally invisible to the host operating system of the target device.
c. It prevents the OS from making any changes to the metadata of files as they are being copied.
You might also like to view...
The first password hacks were a response to the ___________________________________, developed in the early 1960s and first loaded on an IBM mainframe at MIT.?
Fill in the blank(s) with the appropriate word(s).
A(n) ________ is directly connected to a data source such as a table or query and can be used to enter, edit, or display data from that data source
Fill in the blank(s) with correct word
What Brightness setting makes it seem as though you were looking at a color in a completely dark room?
A. 100% B. Soft C. Hard D. 0%
A tabbed list can be converted to a Table by using the ________ button
A) Table B) Format C) List D) Edit