V Encrypted Device Imaging

The following sections provide instructions for imaging an encrypted device and restoring the image to the device: