Ixchel946 Ixchel946 29-02-2024 Computers and Technology contestada A malicious insider is accused of stealing confidential data from your organization. What is the best way to identify the insider's computer?