When investigating a virus, what is the first step?
A. Check IDS logs.
B. Check firewall logs.
C. Trace the origin of the virus.
D. Document the virus.
Answer: D. Document the virus.
Computer Science & Information Technology
You might also like to view...
This will result in miscorrelation of the log events. It is recommended that all network devices synchronize with a reliable NTP servers.
What will be an ideal response?
Computer Science & Information Technology
A mechanical splice sometimes shows which of the following.
What will be an ideal response?
Computer Science & Information Technology