An organization uses a Windows 7 workstation for access tracking in one of their physical data centers on which a guard documents entrance/exit activities of all personnel. A server shut down unexpectedly in this data center, and a security specialist is analyzing the case. Initial checks show that the previous two days of entrance/exit logs are missing, and the guard is confident that the logs were entered on the workstation. Where should the security specialist look next to continue investigating this case?
Alverta
2 months agoTasia
6 days agoNiesha
7 days agoLai
8 days agoJillian
1 months agoJoesph
2 months agoPansy
2 months agoEden
1 months agoAretha
1 months agoDiane
1 months agoKarina
1 months agoMicaela
2 months agoLorrine
2 months agoQuinn
2 months agoTamesha
2 months agoEzekiel
3 months ago