✅ The verified answer to this question is available below. Our community-reviewed solutions help you understand the material better.
A server compromised during a ransomware attack contains encrypted logs. What is your first step in securing these logs for analysis?