Which of the following is the MOST appropriate set of Linux commands that should be executed to conduct the investigation?

Posted by: Pdfprep Category: CFR-310 Tags: , ,

During a security investigation, a suspicious Linux laptop is found in the server room. The laptop is processing information and indicating network activity. The investigator is preparing to launch an investigation to determine what is happening with this laptop.

Which of the following is the MOST appropriate set of Linux commands that should be executed to conduct the investigation?
A . iperf, traceroute, whois, ls, chown, cat
B . iperf, wget, traceroute, dc3dd, ls, whois
C . lsof, chmod, nano, whois, chown, ls
D . lsof, ifconfig, who, ps, ls, tcpdump

Answer: B

Leave a Reply

Your email address will not be published.