How to install consed on your MAC

A Mac OS X user, who is also a frequent user of the Internet, has downloaded a worm. You want to trace the user's steps to determine how this might have happened. Which of the following would be most productive? Answer: b. Examine the contents of the FTP Service log. ................
................