During a security incident, an IaaS compute instance is detected to send traffic to a host related to cryptocurrency mining. The security analyst handling the incident determines the scope of the incident is limited to that particular instance. Which of the following should the security analyst do NEXT?
Pongsathorn
10 months, 4 weeks agoAustinKelleyNet
1 year, 6 months agodavidsvida
1 year, 6 months agoTheGinjaNinja
1 year, 6 months ago