A forensics investigator has been assigned the task of investigating a system user for suspicion of using a company-owned workstation to view unauthorized content. Which of the following would be a proper course of action for the investigator to take?
Cordell
28 days agoKaran
2 days agoKarl
1 months agoMike
9 days agoJaclyn
19 days agoAimee
20 days agoDesirae
1 months agoBernardo
2 months agoSon
28 days agoBrinda
1 months agoDeane
2 months agoMary
2 months agoShawn
2 months agoGennie
2 months ago