An engineer is investigating a ticket from the accounting department in which a user discovered an unexpected application on their workstation. Several alerts are seen from the intrusion detection system of unknown outgoing internet traffic from this workstation. The engineer also notices a degraded processing capability, which complicates the analysis process. Which two actions should the engineer take? (Choose two.)
[Removed]
8 months, 2 weeks agogreeklover84
10 months, 2 weeks agoRAVPN
1 year, 1 month agojay_c_an
1 year, 8 months ago