Ultimate access to all questions.
Upgrade Now 🚀
Sign in to unlock AI tutor
Imagine you have detected a compromised Amazon EC2 instance. Describe the process you would follow to isolate this instance using AWS services, ensuring minimal impact on other resources and maintaining the integrity of forensic data.
A
Terminate the instance, create an EBS snapshot, and store it in an S3 bucket with S3 Object Lock.
B
Detach the instance's network interfaces, create an EBS snapshot, and store it in an isolated forensic account.
C
Stop the instance, create a memory dump, and store it in an S3 bucket with S3 Lifecycle policies.
D
Isolate the instance by changing its security group, create an EBS snapshot, and store it in an S3 bucket with S3 Object Lock.