Which steps should be taken to investigate the suspected compromise?

2 Comments

  1. Ruth
    Author

    I calculate that the answer is:
    Initiate an Amazon Elastic Block Store volume snapshot of all volumes on the EC2 instance.

  2. Kevin
    Author

    I weigh that the answer is:
    Initiate an Amazon Elastic Block Store volume snapshot of all volumes on the EC2 instance.

Leave a Reply

Your email address will not be published. Required fields are marked *

thirteen + 3 =