Answer:
Yes, if you want to be undetected.
Explanation:
It is vital to always use a command that will ensure that one's activity is undetected. This is one of the important rules of corporate organizations to keep their data and activities safe and secure. The commend provided is a useful tool for detective works especially the activities of criminals and hackers. Therefore, if the admin wants to be undetected, the command should not be used.
\\\\\\\\\\\\\\\\\\\\\\\\\Operating system///////////////////////
Is the Answer
Answer: key escrow
Explanation:
Using key escrow we are able to recover data if passphrase is forgotten. this technique uses a bypass link to get all the keys to the system only if it is an authorized entry.