Wesley, a professional hacker, deleted a confidential file in a compromised system using the "/bin/rm/ command to deny access to forensic specialists.
Identify the operating system on which Don has performed the file carving activity.
A . Windows
B . Mac OS
C . Linux
D . Android
Answer: C
Explanation:
In the scenario described, Wesley used the “/bin/rm/” command to delete a confidential file. The “/bin/rm/” command is commonly associated with Linux operating systems. It is used to remove files and directories. By deleting the file, Wesley aimed to hinder forensic specialists’ access to it. Therefore, the operating system on which Wesley performed the file carving activity
is Linux.
Reference: EC-Council Certified Security Specialist (E|CSS) documents and study guide12.
Latest ECSS Dumps Valid Version with 100 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund