Joe, a technician, receives notification that a share for production data files on the network is encrypted. Joe suspects a crypto virus is active. He checks the rights of the network share to see which departments have access. He then searches the user directories of those departmental users who are looking for encrypted files. He narrows his search to a single user's computer.
Once the suspected source of the virus is discovered and removed from the network, which of the following should Joe do NEXT?
JasonSignupHappy
Highly Voted 4 years, 2 months agoMelvinJohn
Highly Voted 4 years, 5 months agocpaljchc
2 years, 5 months agoabxa
Most Recent 2 years, 10 months agoElPato80
3 years, 1 month agoSamuelNascimento
3 years, 2 months agoTripeV
3 years, 3 months agoElPato80
3 years, 1 month agoadeshtall
3 years, 6 months agoDoggyStyle
3 years, 6 months agoZioPier
1 year, 11 months agoENGNET81
3 years, 11 months agodnbly
4 years agoshogo11
4 years agoharinezumi
4 years, 4 months agoep0ch
3 years, 6 months agoTakoyaki
4 years, 6 months ago