A local government that is investigating a data exfiltration claim was asked to review the fingerprint of the malicious user's actions. An investigator took a forensic image of the VM and downloaded the image to a secured USB drive to share with the government.
Which of the following should be taken into consideration during the process of releasing the drive to the government?
bobsmith69
8 months agoMeep123
9 months agoBiteSize
11 months, 1 week agoBreakOff874
1 year, 2 months ago