Which of the following commands could the investigator use to determine which files have been opened by this user?

A security investigator has detected an unauthorized insider reviewing files containing company secrets.

Which of the following commands could the investigator use to determine which files have been opened by this user?
A . ls
B. lsof
C. ps
D. netstat

Answer: B

Latest CFR-410 Dumps Valid Version with 100 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments