Jennifer, a customer, informs you that unexpected icons are appearing on her system's desktop. You identify the symptoms of the malware infection. Which of the following procedures will you perform next?A. Quarantine infected system
B. Schedule scans and run updates
C. Report the issue to the information security officer
D. Disable System Restore (in Windows)
E. Educate end user