You recently discovered that your computer has been infected with malware. You decided that to for the fix action you are going to restore the file system to a point right before the system was infected. What would be best used to do this?
|Attacks, Threats, and Vulnerabilities|
|Architecture and Design|
|Operations and Incident Response|
|Governance, Risk, and Compliance|