An intrusion has occurred in an internet facing system. The security administrator would like to gather forensic
evidence while the system is still in operation. Which of the following procedures should the administrator
perform FIRST on the system?
A.
Make a drive image
B.
Take hashes of system data
C.
Collect information in RAM
D.
Capture network traffic