New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CIW 1D0-610 Exam - Topic 2 Question 77 Discussion

Actual exam question for CIW's 1D0-610 exam
Question #: 77
Topic #: 2
[All 1D0-610 Questions]

Gabby suspects that an attacker has gained control of her system. Which of the following is the most appropriate action for her to take?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Andrew
2 months ago
Wait, is unplugging really the best move?
upvoted 0 times
...
Mila
2 months ago
Running anti-virus is a must too.
upvoted 0 times
...
Willodean
3 months ago
Shutting down might lose important evidence.
upvoted 0 times
...
Lizette
3 months ago
Totally agree, disconnecting is smart!
upvoted 0 times
...
Marcelle
3 months ago
Definitely unplug the network cable first!
upvoted 0 times
...
James
3 months ago
I practiced a similar question where disconnecting from the network was emphasized as a priority. I think that’s what Gabby should do.
upvoted 0 times
...
Keena
4 months ago
Running anti-virus software could help, but I think it’s more critical to prevent further access first.
upvoted 0 times
...
Alesia
4 months ago
I’m not sure if shutting down the computer is the best first step. It might just make things worse if there’s malware involved.
upvoted 0 times
...
Theola
4 months ago
I remember discussing the importance of isolating a compromised system, so unplugging the network cable seems like a good option.
upvoted 0 times
...
Gregoria
4 months ago
Running antivirus software is a good idea, but I'm worried that might not be enough if the attacker has already gained control. Isolating the system seems like the priority.
upvoted 0 times
...
Christoper
4 months ago
Hmm, I'm not sure if shutting down the computer is the best first step. I'd want to try to contain the damage first before powering off.
upvoted 0 times
...
Jennifer
5 months ago
Unplugging the network cable or disabling the wireless NIC sounds like the safest option to me. I don't want to risk the attacker gaining more access.
upvoted 0 times
...
Timothy
5 months ago
This seems like a tricky one. I'll need to think carefully about the best approach to isolate the system and prevent further damage.
upvoted 0 times
...
Jill
10 months ago
I think unplugging the network cable is a good idea to isolate the system from the attacker.
upvoted 0 times
...
Eric
10 months ago
Running anti-virus software could also help in detecting and removing the attacker's control.
upvoted 0 times
...
Gabriele
10 months ago
I agree with Robt, shutting down the computer is the best option to prevent further damage.
upvoted 0 times
...
Robt
11 months ago
I think Gabby should shut down the computer.
upvoted 0 times
...
Millie
11 months ago
Haha, I bet Gabby's going to need a cold one after this. But D is the way to go - stop that attacker in their tracks!
upvoted 0 times
Pearlene
9 months ago
D) Unplug the computer network cable and/or disable the computer's wireless NIC.
upvoted 0 times
...
Narcisa
9 months ago
C) Run anti-virus software on all disks associated with this system.
upvoted 0 times
...
Burma
9 months ago
B) Enable strong encryption on all files on the hard disk.
upvoted 0 times
...
Shawnee
10 months ago
A) Shut down the computer.
upvoted 0 times
...
...
Shayne
11 months ago
B sounds like a smart move. Encrypt those files before the attacker gets their hands on them!
upvoted 0 times
...
Albert
11 months ago
Hmm, I'd say C. Running the antivirus is a good first step to identify and contain the threat.
upvoted 0 times
...
Lisbeth
11 months ago
Definitely D. Cut off that network connection ASAP! Can't have that attacker snooping around any longer.
upvoted 0 times
Kaitlyn
10 months ago
Definitely D. Cut off that network connection ASAP! Can't have that attacker snooping around any longer.
upvoted 0 times
...
Ula
10 months ago
D) Unplug the computer network cable and/or disable the computer's wireless NIC.
upvoted 0 times
...
Gracia
10 months ago
C) Run anti-virus software on all disks associated with this system.
upvoted 0 times
...
Hyman
10 months ago
B) Enable strong encryption on all files on the hard disk.
upvoted 0 times
...
Levi
11 months ago
A) Shut down the computer.
upvoted 0 times
...
...

Save Cancel