During a security investigation, a suspicious Linux laptop is found in the server room. The laptop is processing information and indicating network activity. The investigator is preparing to launch an investigation to determine what is happening with this laptop. Which of the following is the MOST appropriate set of Linux commands that should be executed to conduct the investigation?
044f354
1 month, 3 weeks agosurfuganda
7 months, 1 week agoWutan
1 year, 2 months agoHeyacedoGomez
1 year, 4 months ago