What can cybersecurity professionals use logs for?
a. To analyze data traffic within a network
b. To research and optimize processing capabilities within a network
c. To select which security team members will respond to an incident
d. To identify vulnerabilities and potential security breaches