Multiple Choice
A user's computer is suspected of hosting illegal files. The IT department has removed the computer and placed it in a secured, cypher-locked room, where it will remain until the local authorities arrive. Which of the following actions should the IT department perform NEXT?
A) Preserve data integrity
B) Identify violations of acceptable use
C) Collect evidence of illegal activity
D) Report through proper channels
Correct Answer:

Verified
Correct Answer:
Verified
Q273: A user calls a technician to report
Q274: A new policy requires all users to
Q275: A network administrator notifies a technician that
Q276: Which of the following would BEST support
Q277: A network administrator notifies a technician that
Q279: A user who is running Windows XP
Q280: Which of the following is an example
Q281: A network administrator has given a technician
Q282: A technician is troubleshooting a computer that
Q283: A SOHO technician needs to upgrade two