A security team suspects that an attacker has compromised their system. They examine the commands entered by the attacker to determine whether they can trace the attacker’s actions to help them resolve the incident. What does this scenario describe?

Tools of the Trade: Linux and SQL | Weekly challenge 1 Quiz |

A security team suspects that an attacker has compromised their system. They examine the commands entered by the attacker to determine whether they can trace the attacker’s actions to help them resolve the incident. What does this scenario describe?

  • Reviewing a history file in a CLI
  • Examining the usage of files and applications from a start menu
  • Reviewing a history file in a GUI
  • Repeating a process using icons

 

Leave a Comment