A user’s computer is suspected of hosting illegal files. The IT department has removed the computer and placed it in a secured, cypher-locked room, where it will remain until the local authorities arrive.
Which of the following actions should the IT department perform NEXT?
A . Preserve data integrity
B . Identify violations of acceptable use
C . Collect evidence of illegal activity
D . Report through proper channels
Answer: A
Latest 220-1002 Dumps Valid Version with 623 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund