Which of following log files would be the most useful in determining which internal user was the source of an attack that compromised another computer on the same network?

Which of following log files would be the most useful in determining which internal user was the source of an attack that compromised another computer on the same network?





A. Directory Services logs

B. The attacking computer's audit logs

C. The firewall logs

D. The target computer's audit logs


Answer: D. The target computer's audit logs


Learn More :