Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CertNexus Exam CFR-410 Topic 4 Question 52 Discussion

Actual exam question for CertNexus's CFR-410 exam
Question #: 52
Topic #: 4
[All CFR-410 Questions]

During a security investigation, a suspicious Linux laptop is found in the server room. The laptop is processing information and indicating network activity. The investigator is preparing to launch an investigation to

determine what is happening with this laptop. Which of the following is the MOST appropriate set of Linux commands that should be executed to conduct the investigation?

Show Suggested Answer Hide Answer
Suggested Answer: A, B

Contribute your Thoughts:

Stevie
1 months ago
Wait, is this a Linux version of 'Where's Waldo'? I'm just here to find the laptop and give it a stern talking-to for being in the wrong place.
upvoted 0 times
Vi
13 days ago
C) lsof, chmod, nano, whois, chown, ls
upvoted 0 times
...
Laurene
15 days ago
B) iperf, wget, traceroute, dc3dd, ls, whois
upvoted 0 times
...
Lanie
19 days ago
A) iperf, traceroute, whois, ls, chown, cat
upvoted 0 times
...
...
Bette
1 months ago
Hold on, did someone say server room? That's where the real action is! I'm ready to crack this case wide open with the right set of commands.
upvoted 0 times
...
Harrison
1 months ago
Hmm, this is tricky. I bet the answer is hidden in plain sight, like a needle in a haystack of Linux commands.
upvoted 0 times
Angella
8 days ago
I would go with option D, it includes commands for checking network connections and processes.
upvoted 0 times
...
Rutha
17 days ago
D) lsof, ifconfig, who, ps, ls, tcpdump
upvoted 0 times
...
Gearldine
1 months ago
I think option A looks good, it covers network activity and file management commands.
upvoted 0 times
...
Fidelia
1 months ago
A) iperf, traceroute, whois, ls, chown, cat
upvoted 0 times
...
...
Leonie
2 months ago
Oooh, looks like we've got a mystery on our hands! Time to put on my detective hat and see what these Linux commands can uncover.
upvoted 0 times
Tijuana
9 days ago
After that, we can check the processes with ps and see if anything suspicious is running.
upvoted 0 times
...
Luther
10 days ago
Agreed, we can also use tcpdump to capture network traffic and see where it's going.
upvoted 0 times
...
Casandra
12 days ago
I think we should start by running lsof to see what files are being accessed.
upvoted 0 times
...
...
Pauline
2 months ago
The options seem promising, but I'm not sure what the best commands would be for this specific investigation. Guess I'll have to dig deeper into each set to figure it out.
upvoted 0 times
Ardella
25 days ago
User 2: Yeah, I agree. Those commands seem like they would give us the most information about what's going on with the laptop.
upvoted 0 times
...
Laquita
1 months ago
User 1: I think option D looks like the best choice for investigating the suspicious Linux laptop.
upvoted 0 times
...
...
Iluminada
2 months ago
I'm not sure, but I think option D includes commands that can help us analyze the network activity.
upvoted 0 times
...
Rodolfo
2 months ago
I agree, option D seems to have the most relevant commands for the investigation.
upvoted 0 times
...
Elise
2 months ago
I think we should use option D.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77