You receive a Cloud Monitoring alert about potential malicious activity on a node in your Google Kubernetes Engine (GKE) cluster, suggesting a compromised container. You need to isolate the node to prevent further compromise while minimizing disruption to other applications in the cluster. What is the recommended course of action? | Google Professional Cloud DevOps Engineer Quiz - LeetQuiz