What is the preferred first step to take if an end user suspects that a desktop system has been compromised by an attacker?

What is the preferred first step to take if an end user suspects that a desktop system has been
compromised by an attacker?

What is the preferred first step to take if an end user suspects that a desktop system has been
compromised by an attacker?

A.
Call an IT associate.

B.
Call the IT manager.

C.
Unplug the system from the network.

D.
Unplug the power cable from the system.

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *