1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Akimi4 [234]
1 year ago
13

you are currently logged in using the badams account. you want to view the contents of the /etc/inittab file, but you are not al

lowed to with the badams account. which command could you use to view the file?
Computers and Technology
1 answer:
Blizzard [7]1 year ago
4 0

The command that can be used to view the file is su -c "cat /etc/inittab" -l. The command in computer is a code that is used to tell (someone) to do something in a forceful and often official way.

A command in computer refers to a single order from a user to the computer's operating system or to an application to show a service, such as "Show me all my files" or "Run this program for me.

Kind of command there are:

  1. Group management commands.
  2. Array management commands.
  3. Global commands.

The commands are a kind of sentence to tell someone to do something. The other kind of command are: questions, exclamations and statements.

Learn more about the command, here brainly.com/question/13994833

#SPJ4

You might be interested in
An organization’s SOC analyst, through examination of the company’s SIEM, discovers what she believes is Chinese-state sponsored
Vinil7 [7]

Answer: Provided in the explanation segment

Explanation:

Below is a detailed explanation to make this problem more clearer to understand.

(1). We are asked to determine whether the systems have been compromised;

Ans: (YES) From the question given, We can see that the System is compromised. This is so because the plan of communication has different details of scenarios where incidents occur. This communication plan has a well read table of contents that lists specific type of incidents, where each incident has a brief description of the event.

(2). Whether the analyst’s assertion has valid grounds to believe it is Chinese state-sponsored.

Ans: I can say that the analyst uses several different internet protocol address located in so as to conduct its operations, in one instance, a log file recovered  form an open indexed server revealed tham an IP address located is used to administer the command control node that was communicating with the malware.

(3). What other threat intelligence can be generated from this information?

Ans: The threat that can be generated from this include; Custom backdoors, Strategic web compromises, and also Web Server  exploitation.

(4). How would that help shape your assessment?

Ans: This helps in such a way where information is gathered and transferred out of the target network which involve movement of files through multiple systems.

Files also gotten from networks as well as  using tools (archival) to compress and also encrypt data with effectiveness of their data theft.

cheers i hope this helped!!!

3 0
3 years ago
Regarding the systems development​ process, ________ addresses the​ question, "Is the system producing the desired​ results?"
irakobra [83]

Answer:

Testing

Explanation:

Testing is one of the phases of System Development Life Cycle where the developer checks if the system to be developed conforms to the desired results. Testing could be unit testing, integration testing, performance testing or security testing. After the testing phase has been passed, the system is ready for use.

Other phases of System Development Life Cycle are:

  • Planning
  • Requirements
  • System Design and prototyping
  • Software Development
  • Testing
  • Deployment
  • System maintenance
8 0
4 years ago
Lol fortnite really going UwU and anime
svp [43]

Answer:

epic

Explanation:

7 0
3 years ago
Read 2 more answers
What technology standard is commonly used today for hard drives?
Lisa [10]
Solid-state drive (SSD) is the commonly used technology these days for hard drives .It has pretty advantages over hard disk drive(HDD) .
One advantage is ,its speed is unmatchable to HDD and the data is stored in microchips. Unlike HDD,which uses a mechanical arm with a read/write head to move around and read information from the right location on a storage platter ,it collects information directly from microchips .It is simply the oversized version of USB stick .More reliable and sustainable.
3 0
4 years ago
write a program that inserts on the p position of a string read from the keyboard also another string read from the keyboard
vovangra [49]

Answer:

px

Explanation:

6 0
3 years ago
Other questions:
  • Suppose a worker needs to process 100 items. the time to process each item is exponentially distributed with a mean of 2 minutes
    5·1 answer
  • What is the most important external issue when using social media in emergency management?
    6·1 answer
  • What takes information entered into a given system and sends it automatically to all upstream systems and processes?
    6·2 answers
  • What is the main role of LDAP?
    14·1 answer
  • How do you use VMware Fusion to make a Tip Calculator?
    10·1 answer
  • Sensitive data is always classified true or false
    14·1 answer
  • What is a software? 2 sentences please, I'll mark u as brailiest
    12·1 answer
  • Use the drop-down menus to complete the statements about how to crop an image in a word document.​
    5·2 answers
  • How can you create a messages to look like an IMessage?
    8·1 answer
  • Explain briefly how learning how to follow can make a person a good leader
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!