Why would an attacker execute the command “uname –a”. Group of answer choices Find a users name Find a priviledge users name Find an exploit that affects that particular system. Find the name of the system

Fundamentals of Information Systems
9th Edition
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Ralph Stair, George Reynolds
Chapter9: Cybercrime And Information System Security
Section: Chapter Questions
Problem 8SAT
icon
Related questions
Question

Why would an attacker execute the command “uname –a”.

Group of answer choices
Find a users name
Find a priviledge users name
Find an exploit that affects that particular system.
Find the name of the system
Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Network Security
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Fundamentals of Information Systems
Fundamentals of Information Systems
Computer Science
ISBN:
9781337097536
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning