An organization uses a Windows 7 workstation for access tracking in one of their physical data centers on which a guard documents entrance/exit activities of all personnel. A server shut down unexpectedly in this data center, and a security specialist is analyzing the case. Initial checks show that the previous two days of entrance/exit logs are missing, and the guard is confident that the logs were entered on the workstation. Where should the security specialist look next to continue investigating this case?
Alverta
20 hours agoJoesph
2 days agoPansy
17 days agoMicaela
18 days agoLorrine
19 days agoQuinn
21 days agoTamesha
22 days agoEzekiel
30 days ago