3
answers
1
watching
147
views
myrrcenaryLv1
25 May 2023
A security analyst is concerned that a malicious piece of code was downloaded on a Linux system. After some research, the analyst determines that the suspected piece of code is performing a lot of input/output (I/O) on the disk drive.
Based on the output above, from which of the following process IDs can the analyst begin an investigation?
- 65
- 77
- 83
- 87
A security analyst is concerned that a malicious piece of code was downloaded on a Linux system. After some research, the analyst determines that the suspected piece of code is performing a lot of input/output (I/O) on the disk drive.
Based on the output above, from which of the following process IDs can the analyst begin an investigation?
- 65
- 77
- 83
- 87
Read by 1 person
guruprasadLv3
25 May 2023
Read by 1 person
25 May 2023
Already have an account? Log in
Read by 1 person