contestada

An organization discovers that the computer of the chief financial officer has been infected with malware that includes a keystroke logger and a rootkit. the first action to take would be to?