You have been asked to conduct a forensic analysis of a Linux machine. You are in the command-line and you need to make an unchanged copy of the data on hard drive. What command-line utility can you use to accomplish this task?
Attacks, Threats, and Vulnerabilities | |
Architecture and Design | |
Implementation | |
Operations and Incident Response | |
Governance, Risk, and Compliance |