|
You are troubleshooting a problem on a users computer. After viewing the host- based intrusion detection system (HIDS) logs, you determine that the computer has been compromised by malware.
2.-Of the following choices, what should you do next?
A. Isolate the computer from the network.
B. Review the HIDS logs of neighboring computers.
C. Run an antivirus scan.
D. Analyze the system to discover how it was infected.
|