1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Triss [41]
3 years ago
11

What is the name of the "local user" account involved in the alleged actions (Hint: where in the file structure did you find the

suspect files)? What was the IP address of the alleged offender workstation?
Computers and Technology
1 answer:
Sunny_sXe [5.5K]3 years ago
8 0

I will assume this is a windows computer

Answer:

  • Disk (Letter)\Users\<"Answer">\Folder\Documents\SuspiciousFile.exe
  • You can use Windows Security Logs to try and find out from what IP address the user you just found logged in from.

Explanation:

The windows user folder has folders that contain each users data, Using the file path of the suspicious file you can figure out which user is associated with the file.

Windows Security Logs collect data on logon attempts so when the user logs in their IP address should be collected in these log files.

You might be interested in
Choose all the answers that apply.
Paraphin [41]

When coal is burned it releases, 2: Carbon Dioxide.

3 0
3 years ago
8.10 LAB: Convert to binary - functions Write a program that takes in a positive integer as input, and outputs a string of 1's a
Korvikt [17]

Answer:

// This program is written in C++ programming language

// Comments are used for explanatory purpose

// Program starts here

#include <iostream>

#include <string>

using namespace std;

// Declare variables

int inputvar;

// Declare output variable as array

int outputvar[32];

// Set a counter for binary array

int i = 0;

while (inputvar > 0) {

// Divide inputvar by 2 and store remainder in outputvar

outputvar[i] = n % 2;

inputvar/=2;

i++; // increment i by 1

}

// End of division

// Prin resulting array in reverse order

for (int j = i - 1; j >= 0; j--) {

cout << outputvar[j];

}

return 0;

}

// End of Program

3 0
4 years ago
What is occurring when an attacker manipulates commonplace actions that are routinely performed in a business?
serg [7]

Answer:

Vulnerable business processes, also called business process compromise (BPC), occurs when an attacker manipulates commonplace actions that are routinely performed.

4 0
3 years ago
What are the objects in object-oriented programming language?
VMariaS [17]

Answer:

An object is an abstract data type with the addition of polymorphism and inheritance. Rather than structure programs as code and data, an object-oriented system integrates the two using the concept of an "object". An object has state (data) and behavior (code). Objects can correspond to things found in the real world.

hope it helps ya mate.

5 0
3 years ago
Identify a characteristic of electronic meeting systems.
densk [106]

Answer:

The correct answer to the following question is an option (b).

Explanation:

Desktop conferencing is the feature of the electronic meeting system.

An EMS or electronic meeting system is an application that gives us the facilities of problem-solving and making decisions for that problem within a group, and it also provides the best feature of web conferencing, and the desktop conferencing by which we can chat and tells our problem in the group or a person.

8 0
3 years ago
Other questions:
  • Which of the following statements is true?a. Old paper documents, which were previously only available offline, are increasingly
    10·1 answer
  • TCP has a 32-bit sequence number field and 16-bit advertised window field. Assume that RTT is 512 (2 9 ) ms, transmission speed
    6·1 answer
  • If you increase or decrease the font size of one shape, the font size in other shapes will not be affected. True False
    14·1 answer
  • What element is used to configure a new paragraph?
    9·1 answer
  • What should you do to protect your copyright
    7·1 answer
  • Google's stated mission is to: establish itself as the most valuable media company in the world. organize the world's informatio
    11·1 answer
  • PHP is based on C rather than ______.
    5·1 answer
  • How would you compare and contrast the impact of the printing press with the impact of the internet?
    15·1 answer
  • Which genre of art is specific to digital media?
    8·1 answer
  • For robot arms the first three axes are called
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!