Which of the following commands would a security analyst use to make a copy of an image for forensics use?
A . dd
B . wget
C . touch
D . rm
Answer: A
Which of the following commands would a security analyst use to make a copy of an image for forensics use?
A . dd
B . wget
C . touch
D . rm
Answer: A