A UNIX workstation has been compromised. The security analyst discovers high CPU usage during off-hours on the workstation. Which of the following UNIX programs can be used to detect the rogue process? (Choose two.)
Limited Time Offer
25%
Off
Karan
3 days agoStefan
13 days agoFrance
3 days agoCherry
15 days agoCurtis
17 days agoSueann
21 days agoRonnie
29 days ago