A penetration tester is working on a project and sees a fairly recent VoIP vulnerability has come out. Which of the following records would best help them narrow down potential targets?
1) DNS records
2) Network traffic logs
3) Firewall rules
4) User account information