You discovered a computer that is connected to your network that was used for an attack. You have disconnected the computer from the network to isolate it from the network and stop the attack. Which should you do next?
a) Reboot the computer
b) Analyze the computer's logs and filesystem for evidence
c) Connect the computer to a separate network for further investigation
d) Report the incident to law enforcement