Gabby suspects that an attacker has gained control of her system. Which of the following is the most appropriate action for her to take?
Shut down the computer.
Enable strong encryption on all files on the hard disk.
Run anti-virus software on all disks associated with this system.
Unplug the computer network cable and/or disable the computer’s wireless NIC.
Submit