What tactic was the attacker employing based on this command history? (1 word)
Method:
All of the commands are attempting to find out more information about the computer or system.
Therefore the tactic that the attacker is employing is the first step which is enumeration.