ECCouncil 112-57 Question Answer
Wesley, a professional hacker, deleted a confidential file in a compromised system using the “/bin/rm/” command to deny access to forensic specialists.
Identify the operating system on which Don has performed the file carving act.

