A forensics investigator has been assigned the task of investigating a system user for suspicion of using a company-owned workstation to view unauthorized content. Which of the following would be a proper course of action for the investigator to take?
Cordell
1 months agoShawana
16 hours agoCarlota
8 days agoKaran
18 days agoKarl
2 months agoMike
25 days agoJaclyn
1 months agoAimee
1 months agoDesirae
2 months agoBernardo
2 months agoSon
1 months agoBrinda
2 months agoDeane
2 months agoMary
2 months agoShawn
3 months agoGennie
3 months ago