Westonci.ca is the ultimate Q&A platform, offering detailed and reliable answers from a knowledgeable community. Discover the answers you need from a community of experts ready to help you with their knowledge and experience in various fields. Join our platform to connect with experts ready to provide precise answers to your questions in different areas.

A security breach recently occurred in your enterprise. During the incident investigation, you are asked to examine network-based device logs. Which of the following network devices should you examine first? A) NIDS and NIPS B) Firewall C) DNS D) Routers and switches