When cleaning up a system after a compromise, you should look closely for any ______ that may have been installed by the attacker?
Answers
Answered by
0
Answer: of is the answer
I hope it will be helpful to you
Thank u for waiting
Please mark me as brainliest
Answered by
0
Answer:
While cleaning up a system after a compromise you should look for a virus that might have been installed by the hacker.
Explanation:
Strange popup windows, unauthorized sign-ins, and sluggish systems might be a clue of the presence of the virus in the system.
This can be tackled by installing an anti-virus software into the computer prior to anything happens as this will make sure that your information is safe and is being not being shared without your permission.
After this, we should verify the attack and then personalize the damage and preserve the business assets.
Similar questions
Biology,
6 months ago
Hindi,
6 months ago
Social Sciences,
1 year ago
Chemistry,
1 year ago
Science,
1 year ago