Multiple Choice
John is investigating a situation where an internal user's PC has been hacked by another internal user in the organization. Which of the following locations should he check to determine the source of the attack?
A) The firewall's logs
B) Audit logs of the user who has attacked
C) Domain controller's logs
D) Audit logs of the user who has been attacked
Correct Answer:

Verified
Correct Answer:
Verified
Q26: An email that seems to come from
Q27: You are working as a Security Advisor
Q28: Which of the following attacks involves the
Q29: What is a way for a hacker
Q30: David is concerned about the security of
Q31: Which of the following defines a condition
Q32: Which protocol does the smurf attack use
Q33: Which of the following is a major
Q34: David has just switched on his system
Q36: What is a way of compromising the