Which of following log files would be the most useful in determining which internal user was the source of an attack that compromised another computer on the same network?
A. Directory Services logs
B. The attacking computer's audit logs
C. The firewall logs
D. The target computer's audit logs
Answer: D. The target computer's audit logs