A forensics investigator has been assigned the task of investigating a system user for suspicion of using a company-owned workstation to view unauthorized content. Which of the following would be a proper course of action for the investigator to take?
Bernardo
9 days agoDeane
12 days agoMary
22 days agoShawn
23 days agoGennie
24 days ago