Which action should the Engineer take based on this situation?

1 Comment

  1. Karen
    Author

    I arrange that the answer is:
    Create EBS Snapshots of each of the volumes attached to the compromised instances.

Leave a Reply

Your email address will not be published. Required fields are marked *

11 + 19 =