An incident responder receives a call from a user who reports a computer is exhibiting symptoms consistent with a malware infection. Which of the following steps should the responder perform NEXT?

A. Capture and document necessary information to assist in the response.
B. Request the user capture and provide a screenshot or recording of the symptoms.
C. Use a remote desktop client to collect and analyze the malware in real time.
D. Ask the user to back up files for later recovery.


Answer: A. Capture and document necessary information to assist in the response.

Computer Science & Information Technology

You might also like to view...

An IsEmpty method you write to test whether a linked list is empty is called a __________ method.

a) predefined b) predicate c) preemption d) preorder

Computer Science & Information Technology

A combinational circuit can be defined by Boolean equations, truth table, and _________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Java programs are classes.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What are the main guarantees that users expect conventional servers (e.g. web servers or file servers) to offer?

What will be an ideal response?

Computer Science & Information Technology