English, asked by harkirat5642, 10 months ago

When cleaning up a system after a compromise, you should look closely for any ______ that may have been installed by the attacker?

Answers

Answered by vivekp19
0

Answer: of is the answer

I hope it will be helpful to you

Thank u for waiting

Please mark me as brainliest

Answered by presentmoment
0

Answer:

While cleaning up a system after a compromise you should look for a virus that might have been installed by the hacker.  

Explanation:

Strange popup windows, unauthorized sign-ins, and sluggish systems might be a clue of the presence of the virus in the system.

This can be tackled by installing an anti-virus software into the computer prior to anything happens as this will make sure that your information is safe and is being not being shared without your permission.  

After this, we should verify the attack and then personalize the damage and preserve the business assets.

Similar questions