A help desk technician receives a call from a user stating a program was installed and now random pop-ups are appearing on the computer. The technician notices a lot of suspicious network traffic generated by the user’s computer. The technician quarantines the computer and disables System Restore. Which of the following is the NEXT step technician should take?
A. Update the anti-malware software
B. Perform a malware scan in safe mode
C. Set up scheduled scans and updates
D. Educate the end user on best practices