A security breach recently occurred in your enterprise. During the incident investigation, you are asked to examine network-based device logs. Which of the following network devices should you examine first? A) NIDS and NIPS B) Firewall C) DNS D) Routers and switches