Posted by: Pdfprep
Post Date: November 9, 2020
During a security investigation, a suspicious Linux laptop is found in the server room. The laptop is processing information and indicating network activity. The investigator is preparing to launch an investigation to determine what is happening with this laptop.
Which of the following is the MOST appropriate set of Linux commands that should be executed to conduct the investigation?
A . iperf, traceroute, whois, ls, chown, cat
B . iperf, wget, traceroute, dc3dd, ls, whois
C . lsof, chmod, nano, whois, chown, ls
D . lsof, ifconfig, who, ps, ls, tcpdump
Answer: B
Leave a Reply