Your organization has detected suspicious activity in its AWS environment, and you suspect that a resource has been compromised. Describe the steps you would take to respond to the compromised resource and investigate the incident. | AWS Certified Security - Specialty Quiz - LeetQuiz