What is the preferred first step to take if an end user suspects that a desktop system has been
compromised by an attacker?
A.
Call an IT associate.
B.
Call the IT manager.
C.
Unplug the system from the network.
D.
Unplug the power cable from the system.
Explanation: