An incident responder receives a call from a user who reports a computer is exhibiting symptoms consistent with a malware infection. Which of the following steps should the responder perform NEXT?
A. Capture and document necessary information to assist in the response.
B. Request the user capture and provide a screenshot or recording of the symptoms.
C. Use a remote desktop client to collect and analyze the malware in real time.
D. Ask the user to back up files for later recovery.
Answer: A. Capture and document necessary information to assist in the response.
You might also like to view...
An IsEmpty method you write to test whether a linked list is empty is called a __________ method.
a) predefined b) predicate c) preemption d) preorder
A combinational circuit can be defined by Boolean equations, truth table, and _________.
Fill in the blank(s) with the appropriate word(s).
Java programs are classes.
Answer the following statement true (T) or false (F)
What are the main guarantees that users expect conventional servers (e.g. web servers or file servers) to offer?
What will be an ideal response?