A forensics investigator has been assigned the task of investigating a system user for suspicion of using a company-owned workstation to view unauthorized content. Which of the following would be a proper course of action for the investigator to take?
Bernardo
42 minutes agoDeane
3 days agoMary
13 days agoShawn
14 days agoGennie
15 days ago