WGU Digital-Forensics-in-Cybersecurity Question Answer
A forensic examiner is reviewing a laptop running OS X which has been compromised. The examiner wants to know if any shell commands were executed by any of the accounts.
Which log file or folder should be reviewed?
WGU Digital-Forensics-in-Cybersecurity Summary
- Vendor: WGU
- Product: Digital-Forensics-in-Cybersecurity
- Update on: Jan 2, 2026
- Questions: 79

