CompTIA A+ Certification Exam: Core 2 (#1)

A user’s computer is suspected of hosting illegal files. The IT department has removed the computer and placed it in a secured, cypher-locked room, where it will remain until the local authorities arrive. Which of the following actions should the IT department perform NEXT?

Preserve data integrity
Identify violations of acceptable use
Collect evidence of illegal activity
Report through proper channels