Joe, a technician, receives notification that a share for production data files on the network is encrypted. Joe suspects a crypto virus is active. He checks the rights of the network share to see which departments have access. He then searches the user directories of those departmental users who are looking for encrypted files. He narrows his search to a single user's computer. Once the suspected source of the virus is discovered and removed from the network, which of the following should Joe do NEXT?
A) Educate the end user on safe browsing and email habits.
B) Scan and remove the malware from the infected system.
C) Create a system restore point and reboot the system.
D) Schedule antivirus scans and perform Windows updates.
Correct Answer:
Verified
Q103: Joe, a user, notifies Ann, a technician,
Q104: The IT department has installed new software
Q105: A technician is cleaning up a warehouse
Q106: Which of the following operating systems utilizes
Q107: Ann, a customer, calls a technician and
Q109: A user's computer is running slow even
Q110: Joe, an end user, just changed his
Q111: Which of the following NTFS security settings
Q112: A technician is called to troubleshoot a
Q113: Ann, an external user, has received several
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents