PrepAway - Latest Free Exam Questions & Answers

Which of the following would BEST be used to identify the specific computer used by the insider?

Based on logs from file servers, remote access systems, and IDS, a malicious insider was stealing data using a personal laptop while connected by VPN. The affected company wants access to the laptop to determine loss, but the insider’s lawyer insists the laptop cannot be identified. Which of the following would BEST be used to identify the specific computer used by the insider?

PrepAway - Latest Free Exam Questions & Answers

A.
IP address

B.
User profiles

C.
MAC address

D.
Computer name


Leave a Reply