Based on logs from file servers, remote access systems, and IDS, a malicious insider was stealing
data using a personal laptop while connected by VPN. The affected company wants access to the
laptop to determine loss, but the insider’s lawyer insists the laptop cannot be identified. Which of
the following would BEST be used to identify the specific computer used by the insider?
A.
IP address
B.
User profiles
C.
MAC address
D.
Computer name
Explanation: