II the technician finds vulnerable systems, which of the following is the BEST method to remove the Keylogger?

A technician receives a security alert stating a vendor has left a Keylogger on certain systems that shipped configured from the factory. The technician needs to research the system model numbers to determine if any production computers are affected.

II the technician finds vulnerable systems, which of the following is the BEST method to remove the Keylogger?
A . Update all antivirus definitions and run a full scan on all networked computers.
B . Make sure the operating systems on all networked computers are fully patched and up to date
C . Update all software drivers and firmware on all the affected computers.
D . Enable geofiltering on the network firewall to stop unwanted communications.

Answer: B

Latest 220-1002 Dumps Valid Version with 623 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments