During a security investigation, a suspicious Linux laptop is found in the server room. The laptop is processing information and indicating network activity. The investigator is preparing to launch an investigation to determine what is happening with this laptop.
Which of the following is the MOST appropriate set of Linux commands that should be executed to conduct the investigation?
A . iperf, traceroute, whois, ls, chown, cat
B . iperf, wget, traceroute, dc3dd, ls, whois
C . lsof, chmod, nano, whois, chown, ls
D . lsof, ifconfig, who, ps, ls, tcpdump
Answer: B
Latest CFR-310 Dumps Valid Version with 100 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund