During the analysis phase of an incident, an analyst is tasked with determining the scope of a suspected breach on several servers. Which data source will MOST likely provide the comprehensive information required to assess the activities on the affected servers?
Packet captures
Operating system-specific security logs
Firewall logs
Vulnerability scans