Joe, a network administrator, is working with the security team to determine who deleted files from
a file share. Which of the following would the security team ask Joe to provide during the security
review?
A.
Packet logs
B.
Syslogs
C.
Network logs
D.
Audit logs