Multiple Choice
Joe, a technician, receives notification that a share for production data files on the network is encrypted. Joe suspects a crypto virus is active. He checks the rights of the network share to see which departments have access. He then searches the user directories of those departmental users who are looking for encrypted files. He narrows his search to a single user's computer. Once the suspected source of the virus is discovered and removed from the network, which of the following should Joe do NEXT?
A) Educate the end user on safe browsing and email habits.
B) Scan and remove the malware from the infected system.
C) Create a system restore point and reboot the system.
D) Schedule antivirus scans and perform Windows updates.
Correct Answer:

Verified
Correct Answer:
Verified
Q292: A user calls a technician regarding an
Q293: A manager with a restricted user account
Q294: What a user is allowed to do
Q295: A technician is working on an infected
Q296: A technology team is creating limits and
Q298: A technician needs to make changes to
Q299: A department in an organization set up
Q300: A network administrator has noticed unusual activity
Q301: A Chief Executive Officer (CEO) is giving
Q302: A new business will be using credit