List of questions
Related questions
Question 37 - ECSS discussion
Wesley, a professional hacker, deleted a confidential file in a compromised system using the '/bin/rm/ command to deny access to forensic specialists.
Identify the operating system on which Don has performed the file carving activity.
A.
Windows
B.
Mac OS
C.
Linux
D.
Android
Your answer:
0 comments
Sorted by
Leave a comment first