Notifications
Clear all
Topic starter
03/07/2022 7:27 am
A security analyst is concerned that a malicious piece of code was downloaded on a Linux system. After some research, the analyst determines that the suspected piece of code is performing a lot of input/output (I/O) on the disk drive.
Based on the output above, from which of the following process IDs can the analyst begin an investigation?
- A . 65
- B . 77
- C . 83
- D . 87
Suggested Answer: D