At Westonci.ca, we connect you with the answers you need, thanks to our active and informed community. Explore comprehensive solutions to your questions from knowledgeable professionals across various fields on our platform. Get precise and detailed answers to your questions from a knowledgeable community of experts on our Q&A platform.

A security breach recently occurred in your enterprise. During the incident investigation, you are asked to examine network-based device logs. Which of the following network devices should you examine first? A) NIDS and NIPS B) Firewall C) DNS D) Routers and switches