A user reports a number of inappropriate files appearing and disappearing from their computer. The technician identifies a program running that would appear to be the source of the rogue data. Which of the following should the technician do NEXT?
A. Discover where the files originate
B. Report the activity to management
C. Preserve the inappropriate files
D. Document the result of the service call