A UNIX workstation has been compromised. The security analyst discovers high CPU usage during off-hours on the workstation. Which of the following UNIX programs can be used to detect the rogue process? (Choose two.)
If the rogue process is really good, it might even disguise itself as top to throw off the security analyst. Better bring some garlic and silver bullets just in case.
Maryann
1 months agoErnie
1 months agoSharika
4 days agoMalcolm
8 days agoMuriel
10 days agoKaran
2 months agoLuisa
15 days agoArlyne
19 days agoElouise
29 days agoStefan
2 months agoJaime
2 days agoParis
4 days agoVal
25 days agoHelene
29 days agoGeorgeanna
1 months agoDarrin
1 months agoFrance
2 months agoCherry
2 months agoCurtis
2 months agoFranchesca
1 months agoKaty
1 months agoSueann
2 months agoRonnie
2 months ago