Adam, a malicious hacker has successfully gained unauthorized access to the Linux system ofUmbrella Inc. Web server of the company runs on Apache. He has downloaded sensitive documents and database files from the computer. After performing these malicious tasks, Adam finally runs the following command on the Linux command box before disconnecting. for (( i = 0;i<11;i++ )); do dd if=/dev/random of=/dev/hda && dd if=/dev/zero of=/dev/hda doneWhich of the following actions does Adam want to perform by the abov
A. aking a bit stream copy of the entire hard disk for later download
B. eleting all log files present on the system
C. iping the contents of the hard disk with zeros
D. nfecting the hard disk with polymorphic virus strings