Which action should the Engineer take based on this situation?

1 Comment

  1. Karen
    Author

    I arrange that the answer is:
    Create EBS Snapshots of each of the volumes attached to the compromised instances.

Leave a Reply to Karen Cancel reply

Your email address will not be published. Required fields are marked *

four × two =