Final answer:
The first three steps in CompTIA's seven-step best practices procedure for malware removal are to investigate and verify malware symptoms, quarantine infected systems, and disable System Restore.
Step-by-step explanation:
The correct listing of the first three steps in CompTIA's seven-step best practices procedure for malware removal is as follows:
- Investigate and verify malware symptoms. This step involves identifying any unusual behavior or symptoms that may indicate the presence of malware on a system. It is important to gather information and understand the nature of the malware.
- Quarantine infected systems. This step involves isolating the infected system to prevent further spread of the malware. By doing so, it minimizes the risk of infecting other systems or devices.
- Disable System Restore. This step is to ensure that any potential backups of the malware are removed. System Restore points can sometimes contain infected files, so disabling this feature helps to prevent the restoration of malware.