PrepAway - Latest Free Exam Questions & Answers

Which of the following would BEST be used to identify the specific computer used by the insider?

Based on logs from file servers, remote access systems, and IDS, a malicious insider was stealing
data using a personal laptop while connected by VPN. The affected company wants access to the
laptop to determine loss, but the insider’s lawyer insists the laptop cannot be identified. Which of
the following would BEST be used to identify the specific computer used by the insider?

PrepAway - Latest Free Exam Questions & Answers

A.
IP address

B.
User profiles

C.
MAC address

D.
Computer name

Explanation:


Leave a Reply