Which log would you check to monitor events related to usage of USB devices?

Study for the Investigations and Evidence Recovery Test with our resources. Explore multiple choice questions, flashcards, and detailed explanations. Prepare effectively to excel in your exam!

The correct log to check for monitoring events related to the usage of USB devices is the Security log. This log specifically records events related to security, such as logons, logoff, and access to sensitive objects, including the connection and disconnection of USB devices. When a USB device is connected or removed, these events are typically logged in the Security log, allowing administrators to track and audit usage patterns, potential security incidents, or unauthorized access.

The other logs mentioned do not provide the same level of detail for USB device usage. The Application log is primarily focused on application-specific events, while the System log captures system-related events such as hardware failures and system services. The Kernel log, which records events related to the operating system's kernel, doesn’t specifically address USB device events. Therefore, for monitoring USB device usage, the Security log is the most relevant choice.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy