A forensics investigator has been assigned the task of investigating a system user for suspicion of using a company-owned workstation to view unauthorized content. Which of the following would be a proper course of action for the investigator to take?
Cordell
2 months agoShawana
1 months agoCarlota
1 months agoKaran
2 months agoKarl
3 months agoMike
2 months agoJaclyn
2 months agoAimee
2 months agoDesirae
3 months agoBernardo
3 months agoSon
2 months agoBrinda
3 months agoDeane
3 months agoMary
3 months agoShawn
4 months agoGennie
4 months ago