List of questions
Related questions
Question 194 - SCS-C02 discussion
A security engineer needs to develop a process to investigate and respond to po-tential security events on a company's Amazon EC2 instances. All the EC2 in-stances are backed by Amazon Elastic Block Store (Amazon EBS). The company uses AWS Systems Manager to manage all the EC2 instances and has installed Systems Manager Agent (SSM Agent) on all the EC2 instances.
The process that the security engineer is developing must comply with AWS secu-rity best practices and must meet the following requirements:
* A compromised EC2 instance's volatile memory and non-volatile memory must be preserved for forensic purposes.
* A compromised EC2 instance's metadata must be updated with corresponding inci-dent ticket information.
* A compromised EC2 instance must remain online during the investigation but must be isolated to prevent the spread of malware.
* Any investigative activity during the collection of volatile data must be cap-tured as part of the process.
Which combination of steps should the security engineer take to meet these re-quirements with the LEAST operational overhead? (Select THREE.)
0 comments
Leave a comment first