2
answers
1
watching
421
views
aminul2005Lv1
13 Feb 2022
A security analyst is concerned that a malicious piece of code was downloaded on a Linux system. After some research, the analyst determines that the suspected piece of code is performing a lot of input/output (I/O) on the disk drive.
Based on the output above, from which of the following process IDs can the analyst begin an investigation?
Options:
A 65
B 77
C 83
D 87
Note : if you are not 100% sure then dont answer ...
A security analyst is concerned that a malicious piece of code was downloaded on a Linux system. After some research, the analyst determines that the suspected piece of code is performing a lot of input/output (I/O) on the disk drive.
Based on the output above, from which of the following process IDs can the analyst begin an investigation?
Options:
A 65
B 77
C 83
D 87
Note : if you are not 100% sure then dont answer ...
Read by 2 people
Read by 3 people