You have been asked to conduct a forensic analysis of a Linux machine. You are in the command-line and you need to make an unchanged copy of the data on hard drive. What command-line utility can you use to accomplish this task?
|Operations and Incident Response|
|Architecture and Design|
|Governance, Risk, and Compliance|
|Attacks, Threats, and Vulnerabilities|