Which action should the Engineer take based on this situation?

2 Comments

  1. Karen
    Author

    I arrange that the answer is:
    Create EBS Snapshots of each of the volumes attached to the compromised instances.

  2. Roger
    Author

    I outline that the answer is:
    Create EBS Snapshots of each of the volumes attached to the compromised instances.

Leave a Reply

Your email address will not be published. Required fields are marked *

13 − 1 =