During a forensic investigation, you discover a file named "passwords.txt" on a compromised workstation. It appears to contain a list of usernames and passwords. What is the MOST important step to take regarding this file? a) Open the file to verify the contents and determine the scope of the potential breach. b) Immediately delete the file to prevent further unauthorized access. c) Securely copy the file to a separate forensic workstation for analysis, ensuring chain of custody. d) Encrypt the file in place and notify the system administrator to change all listed passwords.