A network security specialist is investigating a large and sustained spike in alerts from their Security Information and Event Management (SIEM) system. Which data source should the specialist investigate first to try and determine the cause of the spike in alerts?
A. External web traffic statistics.
B. Log Data.
C. General IT equipment inventory lists.
D. Standard operational procedures documentation.