While reviving the logs at a customer site you notice that one particular device is accessing multiple servers in the environment, using a number of different user accounts. When you question the IT admin, they tell you that the computer is a JumpBox and running software used to monitor all of the servers in the environment.
Would this be a logical next step? (You can safely ignore this activity as this is normal behavior for a JumpBox.)
A. Yes
B. No