Ultimate access to all questions.
Upgrade Now 🚀
Sign in to unlock AI tutor
Your organization has detected suspicious activity in its AWS environment, and you suspect that a resource has been compromised. Describe the steps you would take to respond to the compromised resource and investigate the incident.
A
Immediately terminate the suspected compromised resource to prevent further damage.
B
Isolate the suspected compromised resource to prevent lateral movement and limit the scope of the incident.
C
Conduct a thorough investigation of the suspicious activity, including reviewing logs and monitoring tools, to determine the extent and severity of the incident.
D
Notify the relevant stakeholders and initiate the incident response plan to coordinate a response to the incident.