During a security investigation, a suspicious Linux laptop is found in the server room. The laptop is processing information and indicating network activity. The investigator is preparing to launch an investigation to
determine what is happening with this laptop. Which of the following is the MOST appropriate set of Linux commands that should be executed to conduct the investigation?
Chau
3 months agoAlmeta
3 months agoAlbina
4 months agoSimona
4 months agoMary
4 months agoChaya
4 months agoMickie
5 months agoSilva
5 months agoElvera
5 months agoChrista
5 months agoLucina
5 months agoIvory
5 months agoKaitlyn
5 months agoStevie
10 months agoVi
9 months agoLaurene
9 months agoLanie
9 months agoBette
10 months agoHarrison
10 months agoAngella
9 months agoRutha
9 months agoGearldine
10 months agoFidelia
10 months agoLeonie
10 months agoTijuana
9 months agoLuther
9 months agoCasandra
9 months agoPauline
11 months agoArdella
9 months agoLaquita
10 months agoIluminada
11 months agoRodolfo
11 months agoElise
11 months ago