A Certified Fraud Examiner arrives to seize a computer that is currently powered on and is suspected of containing evidence of an ongoing data exfiltration scheme. To ensure that crucial, time-sensitive evidence is not lost, which of the following actions should be performed FIRST?
-
A
Create a bit-stream image of the hard drive.
-
B
Disconnect the computer from the network to stop the data exfiltration.
-
C
Photograph the screen and all physical connections to the computer.
-
D
Perform a live acquisition to capture the contents of RAM.