Which of the following commands would a security analyst use to make a copy of an image for forensics use?
A.
dd
B.
wget
C.
touch
D.
rm
Which of the following commands would a security analyst use to make a copy of an image for forensics use?
Which of the following commands would a security analyst use to make a copy of an image for forensics use?
A.
dd
B.
wget
C.
touch
D.
rm