A technician is dispatched to a malware infected system. Upon arrival, the technician notices the malwares pop-up on the screen. Which of the following boot methods would the technician utilize?
A. Reboot in Safe Mode
B. Reboot in Recovery Console
C. Reboot in Last Known Good Configuration
D. Reboot in System Debug Mode
Answer: A. Reboot in Safe Mode
Computer Science & Information Technology
You might also like to view...
A database ________ organizes information into fields and records
Fill in the blank(s) with correct word
Computer Science & Information Technology
An exploit that leaves an attacker with another way to compromise a network later is called which of the following? (Choose all that apply.)
a. Rootkit b. Worm c. Backroot d. Backdoor
Computer Science & Information Technology