A UNIX workstation has been compromised. The security analyst discovers high CPU usage during off-hours on the workstation. Which of the following UNIX programs can be used to detect the rogue process? (Choose two.)
Limited Time Offer
25%
Off
Stefan
8 days agoCherry
10 days agoCurtis
12 days agoSueann
16 days agoRonnie
24 days ago