The Chief Information Security Officer (CISO) has asked the security analyst to examine abnormally high processor utilization on a key server. The output below is from the company’s research and development (R&D) server.
Which of the following actions should the security analyst take FIRST?
A. Initiate an investigation
B. Isolate the R&D server
C. Reimage the server
D. Determine availability