You recently discovered that your computer has been infected with malware. You decided that to for the fix action you are going to restore the file system to a point right before the system was infected. What would be best used to do this?
Attacks, Threats, and Vulnerabilities | |
Architecture and Design | |
Implementation | |
Operations and Incident Response | |
Governance, Risk, and Compliance |