Which of the following commands could the investigator use to determine which files have been opened by this user?
A security investigator has detected an unauthorized insider reviewing files containing company secrets.
Which of the following commands could the investigator use to determine which files have been opened by this user?
A . ls
B. lsof
C. ps
D. netstat
Answer: B
Latest CFR-410 Dumps Valid Version with 100 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments