Which of the following security concepts would Sara, the security administrator, use to mitigate the risk of data loss?
Which of the following should the security administrator do when taking a forensic image of a hard drive?