A company finds that one of its Amazon EC2 instances suddenly has a high CPU usage. The company does not know whether the EC2 instance is compromised or whether the operating system is performing background cleanup.
Which combination of steps should a security engineer take before investigating the issue? (Choose three.)
AdamWest
Highly Voted 2 years, 5 months agotainh
Highly Voted 2 years, 5 months agoToptip
Most Recent 1 year, 11 months agoD2
2 years, 5 months agoluisfsm_111
2 years, 5 months ago