A UNIX workstation has been compromised. The security analyst discovers high CPU usage during off-hours on the workstation. Which of the following UNIX programs can be used to detect the rogue process? (Choose two.)
If the rogue process is really good, it might even disguise itself as top to throw off the security analyst. Better bring some garlic and silver bullets just in case.
Maryann
2 months agoErnie
2 months agoSharika
1 months agoMalcolm
1 months agoMuriel
1 months agoKaran
3 months agoLuisa
2 months agoArlyne
2 months agoElouise
2 months agoStefan
3 months agoLaurena
30 days agoJaime
1 months agoParis
1 months agoVal
2 months agoHelene
2 months agoGeorgeanna
2 months agoDarrin
2 months agoFrance
3 months agoCherry
3 months agoCurtis
3 months agoFranchesca
2 months agoKaty
2 months agoSueann
3 months agoRonnie
4 months ago