solution. Which of the following will MOST likely be used to identify when the breach occurred through each
device?
A. SIEM correlation dashboards
B. Firewall syslog event logs
C. Network management solution login audit logs
D. Bandwidth monitors and interface sensors