セキュリティ アナリストは、悪意のあるコードが Linux システムにダウンロードされたことを懸念しています。いくつかの調査の後、アナリストは、疑わしいコード部分がディスク ドライブ上で大量の入出力 (I/O) を実行していることを突き止めました。

上記の出力に基づいて、アナリストは次のプロセス ID のどれから調査を開始できますか?
正解:D
The process ID 87 can be the starting point for an investigation of a possible buffer overflow attack, as it shows a high percentage of CPU utilization (99.7%) and a suspicious command name (graphic.linux_randomization.prg). A buffer overflow attack is a type of attack that exploits a vulnerability in an application or system that allows an attacker to write data beyond the allocated buffer size, potentially overwriting memory segments and executing malicious code. A high CPU utilization could indicate that the process is performing intensive or abnormal operations, such as a buffer overflow attack. A suspicious command name could indicate that the process is trying to disguise itself or evade detection, such as by mimicking a legitimate program or using random characters. The other process IDs do not show signs of a buffer overflow attack, as they have low CPU utilization and normal command names. Verified References:
https://www.comptia.org/blog/what-is-buffer-overflowhttps://partners.comptia.org/docs/default-source/resources