During a security investigation, a suspicious Linux laptop is found in the server room. The laptop is processing information and indicating network activity. The investigator is preparing to launch an investigation to
determine what is happening with this laptop. Which of the following is the MOST appropriate set of Linux commands that should be executed to conduct the investigation?
Stevie
1 months agoVi
13 days agoLaurene
15 days agoLanie
19 days agoBette
1 months agoHarrison
1 months agoAngella
8 days agoRutha
17 days agoGearldine
1 months agoFidelia
1 months agoLeonie
2 months agoTijuana
9 days agoLuther
10 days agoCasandra
12 days agoPauline
2 months agoArdella
25 days agoLaquita
1 months agoIluminada
2 months agoRodolfo
2 months agoElise
2 months ago