The incident response team has received the following email message.
From: email@example.com To: firstname.lastname@example.org Subject: Copyright infringement
A copyright infringement alert was triggered by IP address 18.104.22.168 at 09: 50: 01 GMT.
After reviewing the following web logs for IP 22.214.171.124, the team is unable to correlate and identify the incident.
45: 33 126.96.36.199 http: //remote.site.com/login.asp?user=john
50: 22 188.8.131.52 http: //remote.site.com/logout.asp?user=anne
10: 50: 01 184.108.40.206 http: //remote.site.com/access.asp?file=movie.mov
11: 02: 45 220.127.116.11 http: //remote.site.com/download.asp?movie.mov=ok
Which of the following is the MOST likely reason why the incident response team is unable to identify and correlate the incident?
A. The logs are corrupt and no longer forensically sound.
B. Traffic logs for the incident are unavailable.
C. Chain of custody was not properly maintained.
D. Incident time offsets were not accounted for.