You have determined that an attack is currently underway on your database server. An attacker is
currently logged in, modifying data. You want to preserve logs, caching and other data on this
affected server. Which of the following actions will best allow you to stop the attack and still
preserve data?
A.
Pull the server network cable
B.
Shut down the server
C.
Back up the system logs
D.
Force an instant password reset