Which of the following actions could validate the hypothesis that a pontial data breach occurred via telnet access?
A) Reviewing server logs for login attempts via telnet
B) Analyzing network traffic for suspicious patterns
C) Conducting a vulnerability scan on the server
D) Checking the server's firewall configuration