What is the first thing you should do when you discover a computer is infected with malware?

a. Turn off system protection

b. Update installed anti-malware software.

c. Format the hard drive.

d. Quarantine the computer.


d. Quarantine the computer.

Computer Science & Information Technology

You might also like to view...

Which of the following best defines what intrusion detection is? (Select all that apply.)

a. The monitoring of data packets passing through the network to catch potential attacks. b. The monitoring of data packets passing through the network to catch ongoing attacks. c. The monitoring of data packets with invalid IP addresses that pass through the network. d. None of these answers is correct.

Computer Science & Information Technology

Which of the following is not true about column headers in a table?

A) They should be in the first row. B) They should identify the contents of the columns. C) They should be equal in size to the subheading. D) They should be formatted differently than the text in the table.

Computer Science & Information Technology

An Active Directory object's security settings are composed of three components, what term is used to refer to these three components?

A. DACL B. security descriptor C. system access D. SACL

Computer Science & Information Technology

SSL/TLS provides security ________.

between the sender and his or her e-mail server all the way between the sender and the receiver Both between the sender and his or her e-mail server and all the way between the sender and the receiver Neither between the sender and his or her e-mail server nor all the way between the sender and the receiver

Computer Science & Information Technology