Question 85:
A user`s computer is suspected of hosting illegal files. The IT department has removed the computer and placed it in a secured, cypher-locked room, where it will remain until the local authorities arrive. Which of the following actions should the IT department perform NEXT?
Answer options:
A. Preserve data integrity B. Identify violations of acceptable use C. Collect evidence of illegal activity D. Report through proper channels