Exam4Training

Which of the following commands could the investigator use to determine which files have been opened by this user?

A security investigator has detected an unauthorized insider reviewing files containing company secrets.

Which of the following commands could the investigator use to determine which files have been opened by this user?
A . ls
B . lsof
C . ps
D . netstat

Answer: B

Explanation:

Reference: https://books.google.com.pk/books?id=sxr50IxP27AC&pg=PA49&lpg=PA49&dq=linux+commands+could+the+investigator+use+to+determine+which+files+have+been+opened+by+this+user&source=bl&ots=RUG5bOAhGE&sig=ACfU3U3qv3h4lGh1GQP6mdNLy1RZH­SPDg&hl=en&sa=X&ved=2ahUKEwiNpPeambbpAhVmx4UKHVt5CeIQ6AEwAHoECBMQAQ#v=onepage&q=linux%20commands%20could%20the%20investigator%20use%20to%20determine%20which%20files% 20have%20been%20opened%20by%20this%20user&f=false

Latest CFR-310 Dumps Valid Version with 100 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Exit mobile version