The incident response team has received the following email message.
From: firstname.lastname@example.org To: email@example.com Subject: Copyright infringement
A copyright infringement alert was triggered by IP address 184.108.40.206 at 09: 50: 01 GMT.
After reviewing the following web logs for IP 220.127.116.11, the team is unable to correlate and identify the incident.
45: 33 18.104.22.168 http: //remote.site.com/login.asp?user=john
50: 22 22.214.171.124 http: //remote.site.com/logout.asp?user=anne
10: 50: 01 126.96.36.199 http: //remote.site.com/access.asp?file=movie.mov
11: 02: 45 188.8.131.52 http: //remote.site.com/download.asp?movie.mov=ok
Which of the following is the MOST likely reason why the incident response team is unable to identify and correlate the incident?
A. The logs are corrupt and no longer forensically sound.
B. Traffic logs for the incident are unavailable.
C. Chain of custody was not properly maintained.
D. Incident time offsets were not accounted for.