Why was it necessary to run ps as root (prefacing the command with sudo)?

Step 1. Access the command line.

a. Log on to the CyberOps Workstation VM as the analyst, using the password cyberops. The account analyst is used as the example user account throughout this lab.

b. To access the command line, click the terminal icon located in the Dock, at the bottom of VM screen. The terminal emulator opens.



Step 2. Display the services currently running.

a. Use the ps command to display all the programs running in the background:



[analyst@secOps ~]$ sudo ps –elf

[sudo] password for analyst:

F S UID PID PPID C PRI NI ADDR SZ WCHAN STIME TTY TIME CMD

4 S root 1 0 0 80 0 - 2250 SyS_ep Feb27 ? 00:00:00 /sbin/init

1 S root 2 0 0 80 0 - 0 kthrea Feb27 ? 00:00:00 [kthreadd]

1 S root 3 2 0 80 0 - 0 smpboo Feb27 ? 00:00:00 [ksoftirqd/0]

1 S root 5 2 0 60 -20 - 0 worker Feb27 ? 00:00:00 [kworker/0:0H]

1 S root 7 2 0 80 0 - 0 rcu_gp Feb27 ? 00:00:00 [rcu_preempt]

1 S root 8 2 0 80 0 - 0 rcu_gp Feb27 ? 00:00:00 [rcu_sched]

1 S root 9 2 0 80 0 - 0 rcu_gp Feb27 ? 00:00:00 [rcu_bh]

1 S root 10 2 0 -40 - - 0 smpboo Feb27 ? 00:00:00 [migration/0]

1 S root 11 2 0 60 -20 - 0 rescue Feb27 ? 00:00:00 [lru-add-drain]

5 S root 12 2 0 -40 - - 0 smpboo Feb27 ? 00:00:00 [watchdog/0]

1 S root 13 2 0 80 0 - 0 smpboo Feb27 ? 00:00:00 [cpuhp/0]

5 S root 14 2 0 80 0 - 0 devtmp Feb27 ? 00:00:00 [kdevtmpfs]

1 S root 15 2 0 60 -20 - 0 rescue Feb27 ? 00:00:00 [netns]

1 S root 16 2 0 80 0 - 0 watchd Feb27 ? 00:00:00 [khungtaskd]

1 S root 17 2 0 80 0 - 0 oom_re Feb27 ? 00:00:00 [oom_reaper]




Some processes do not belong to the analyst user and may not be displayed if ps was executed as analyst, which is a regular user account.

Computer Science & Information Technology

You might also like to view...

________ testing involves releasing new software to a limited group of users for error testing

Fill in the blank(s) with correct word

Computer Science & Information Technology

What is the "POP before SMTP" authentication method and how is it used to defend against improper use of an SMTP server?

What will be an ideal response?

Computer Science & Information Technology

Write a program that will read a line of text that ends with a period, which serves as a sentinel value. Display all the letters that occur in the text, one per line and in alphabetical order, along with the number of times each letter occurs in the text. Use an array of base type int of length 26, so that the element at index 0 contains the number of a’s, the element at index 1 contains the number of b’s, and so forth. Allow both uppercase and lowercase letters as input, but treat uppercase and lowercase versions of the same letter as being equal. Hints: Use one of the methods toUpperCase or toLowerCase in the wrapper class Character, described in Chapter 6. You will find it helpful to define a method that takes a character as an argument and returns an int value that is the correct index

This project is a bit challenging to get the loop conditions right. The objective is to keep the array index within bounds and count only letters. Another little problem is how to get the printable character code from the array index after the letter counts have been determined. The "trick" is to know that adding 65 decimal to the array index will produce the ASCII code for the character.

Computer Science & Information Technology

Frame relay uses multiple virtual connections over multiple cable media.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology