A technician is dispatched to a malware infected system. Upon arrival, the technician notices the malwares pop-up on the screen. Which of the following boot methods would the technician utilize?

A. Reboot in Safe Mode
B. Reboot in Recovery Console
C. Reboot in Last Known Good Configuration
D. Reboot in System Debug Mode

Answer: A. Reboot in Safe Mode

Computer Science & Information Technology

You might also like to view...

A database ________ organizes information into fields and records

Fill in the blank(s) with correct word

Computer Science & Information Technology

An exploit that leaves an attacker with another way to compromise a network later is called which of the following? (Choose all that apply.)

a. Rootkit b. Worm c. Backroot d. Backdoor

Computer Science & Information Technology