In order to make a forensically sound copy of a hard disk for analysis, it is critical that you employ a write-blocker. What does this device do that makes for a sound copy?

a. It performs bit by bit error correction of each sector of the source hard disk as it is copied to the target medium.
b. It prevents rootkits from destroying the data when it detects the lauch of a copy routine.
c. It prevents the OS from making any changes to the metadata of files as they are being copied.
d. It is capable of reading the system files that are generally invisible to the host operating system of the target device.


c. It prevents the OS from making any changes to the metadata of files as they are being copied.

Computer Science & Information Technology

You might also like to view...

The first password hacks were a response to the ___________________________________, developed in the early 1960s and first loaded on an IBM mainframe at MIT.?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A(n) ________ is directly connected to a data source such as a table or query and can be used to enter, edit, or display data from that data source

Fill in the blank(s) with correct word

Computer Science & Information Technology

What Brightness setting makes it seem as though you were looking at a color in a completely dark room?

A. 100% B. Soft C. Hard D. 0%

Computer Science & Information Technology

A tabbed list can be converted to a Table by using the ________ button

A) Table B) Format C) List D) Edit

Computer Science & Information Technology