A data breach is suspected on a currently unidentified server in a datacenter. Which of the following is the BEST method of determining which server was
breached?

A.
Network traffic logs
B.
System image capture
C.
Asset inventory review
D.
RAM analysis