Ultimate access to all questions.
You receive a Cloud Monitoring alert about potential malicious activity on a node in your Google Kubernetes Engine (GKE) cluster, suggesting a compromised container. You need to isolate the node to prevent further compromise while minimizing disruption to other applications in the cluster. What is the recommended course of action?