Which of the following commands would a security analyst use to make a copy of an image for forensics use?