Which of the following commands would a security analyst use to make a copy of an image for forensics use?
A.
dd
B.
wget
C.
touch
D.
rm
Which of the following commands would a security analyst use to make a copy of an image for forensics use?
A.
dd
B.
wget
C.
touch
D.
rm
You must be logged in to post a comment.