Solved

John Is Investigating a Situation Where an Internal User's PC

Question 35

Multiple Choice

John is investigating a situation where an internal user's PC has been hacked by another internal user in the organization. Which of the following locations should he check to determine the source of the attack?


A) The firewall's logs
B) Audit logs of the user who has attacked
C) Domain controller's logs
D) Audit logs of the user who has been attacked

Correct Answer:

verifed

Verified

Unlock this answer now
Get Access to more Verified Answers free of charge

Related Questions