Watch this video on YouTube
Fill in the blank: To track changes made by attackers during a cyber range exercise, it's essential to use the ______ command to monitor real-time file system changes.