You suspect a hacker has accessed the network. Which of the following may help you confirm your suspicion?