Which of the following commands could the investigator use to determine which files have been opened by this user?
A security investigator has detected an unauthorized insider reviewing files containing company secrets.
Which of the following commands could the investigator use to determine which files have been opened by this user?
A . ls
B . lsof
C . ps
D . netstat
Answer: B
Explanation:
Reference: https://books.google.com.pk/books?id=sxr50IxP27AC&pg=PA49&lpg=PA49&dq=linux+commands+could+the+investigator+use+to+determine+which+files+have+been+opened+by+this+user&source=bl&ots=RUG5bOAhGE&sig=ACfU3U3qv3h4lGh1GQP6mdNLy1RZHSPDg&hl=en&sa=X&ved=2ahUKEwiNpPeambbpAhVmx4UKHVt5CeIQ6AEwAHoECBMQAQ#v=onepage&q=linux%20commands%20could%20the%20investigator%20use%20to%20determine%20which%20files% 20have%20been%20opened%20by%20this%20user&f=false
Latest CFR-310 Dumps Valid Version with 100 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund