An employee accessed a website that caused a device to become infected with invasive malware. The incident response analyst has:
• created the initial evidence log.
• disabled the wireless adapter on the device.
• interviewed the employee, who was unable to identify the website that was accessed.
• reviewed the web proxy traffic logs.
Which of the following should the analyst do to remediate the infected device?
RobV
Highly Voted 1 year, 4 months agokylestobaugh
Most Recent 8 months, 3 weeks agocartman_sc
10 months, 2 weeks agoKmelaun
11 months, 1 week agoKmelaun
11 months, 1 week agoKmelaun
11 months, 1 week agoBanesTech
12 months agodeeden
1 year, 4 months agoLiteralGod
1 year, 5 months agonawdawgimgood
1 year, 6 months agokmordalv
1 year, 6 months ago[Removed]
1 year, 6 months ago[Removed]
1 year, 5 months ago