A security alert has been raised for an Amazon EC2 instance in a customer account that is exhibiting strange behavior. The Security Engineer must first isolate the
EC2 instance and then use tools for further investigation.
What should the Security Engineer use to isolate and research this event? (Choose three.)
INASR
Highly Voted 3 years, 9 months agoOsemk
Highly Voted 3 years, 9 months agoRaphaello
Most Recent 1 year, 4 months agoNuha_23
1 year, 10 months agoliuyomz
1 year, 11 months agodcyberguy
2 years agosandromechi
1 year, 12 months agoRobert0
2 years, 1 month agomatrpro
2 years, 2 months agozeeke
2 years, 4 months agopeddyua
2 years, 4 months agoDara2315
2 years, 6 months agoskillz2investor
2 years, 7 months agojanvandermerwer
2 years, 7 months agoMr__
2 years, 9 months agoRoot_Access
2 years, 10 months agovbal
2 years, 10 months agoSickcnt
1 year, 12 months agopymattew
3 years, 2 months agosanjaym
3 years, 8 months ago