You notice unusual traffic coming from a system and want to investigate. After using SSH to connect using the server's hostname you want to determine any IP addresses assigned to the server. It is a Linux operating system. What command could you use?
Attacks, Threats, and Vulnerabilities | |
Architecture and Design | |
Implementation | |
Operations and Incident Response | |
Governance, Risk, and Compliance |