Which of the following should Jane, a security administrator, perform before a hard drive is analyzed with forensics tools?
Which of the following is the MOST likely reason why the incident response team is unable to identify and correlate the incident?
Which of the following is a problem that the incident response team will likely encounter during their assessment?