Which of the following should Bill, a security administrator, perform before a hard drive is analyzed with forensics tools?
The system image should be captured and backed up on another storage device.