Which of the following commands would a security analyst use to make a copy of an image for forensics use?
A. dd
B. wget
C. touch
D. rm
Which of the following commands would a security analyst use to make a copy of an image for forensics use?
A. dd
B. wget
C. touch
D. rm