An intrusion has occurred in an internet facing system. The security administrator would like to
gather forensic evidence while the system is still in operation. Which of the following procedures
should the administrator perform FIRST on the system?
A.
Make a drive image
B.
Take hashes of system data
C.
Collect information in RAM
D.
Capture network traffic