Which of the following outcomes best illustrates a sophisticated utilization of log aggregation in network operations?
Routine analysis of single device logs
Correlation of events to identify security incidents
Automated backing up of configuration files
Monitoring of individual link utilization rates