The system administrator suspects the machine has been compromised and would like to search the system for any setuid programs. Which of the following commands would accomplish this?
A.
search u+s
B.
locate –suid
C.
rpm -Va
D.
find / -perm -4000
The system administrator suspects the machine has been compromised and would like to search the system for any setuid programs. Which of the following commands would accomplish this?
The system administrator suspects the machine has been compromised and would like to search the system for any setuid programs. Which of the following commands would accomplish this?
A.
search u+s
B.
locate –suid
C.
rpm -Va
D.
find / -perm -4000
I choose D