A security incident has occurred on a file server. Which of the following data sources should be gathered to address file storage volatility?
A) Event logs
B) Memory dumps
C) File system metadata
D) Network traffic logs