When investigating a virus, what is the first step?

A. Check IDS logs.
B. Check firewall logs.
C. Trace the origin of the virus.
D. Document the virus.

Answer: D. Document the virus.

Computer Science & Information Technology

You might also like to view...

This will result in miscorrelation of the log events. It is recommended that all network devices synchronize with a reliable NTP servers.

What will be an ideal response?

Computer Science & Information Technology

A mechanical splice sometimes shows which of the following.

What will be an ideal response?

Computer Science & Information Technology