Q: 19
A systems administrator is trying to track down a rogue process that has a TCP listener on a network
interface for remote command-and-control instructions.
Which of the following commands should the systems administrator use to generate a list of rogue
process names? (Select two).
Options
Discussion
Is the admin trying to identify only listening processes or any open TCP connection? If the question was about established connections instead of specifically listeners, it might change whether A and B are enough here.
Be respectful. No spam.