Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam 312-49 Topic 1 Question 70 Discussion

Actual exam question for Eccouncil's 312-49 exam
Question #: 70
Topic #: 1
[All 312-49 Questions]

Donald made an OS disk snapshot of a compromised Azure VM under a resource group being used by the affected company as a part of forensic analysis process. He then created a vhd file out of the snapshot and stored it in a file share and as a page blob as backup in a storage account under different region. What Is the next thing he should do as a security measure?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Tamra
3 months ago
Option D sounds tempting, but I don't think creating another VM from the compromised snapshot is a good idea. Let's stick to the security basics here.
upvoted 0 times
Pilar
2 months ago
C) Delete the OS disk of the affected VM altogether
upvoted 0 times
...
Julianna
2 months ago
B) Delete the snapshot from the source resource group
upvoted 0 times
...
Bettina
2 months ago
A) Recommend changing the access policies followed by the company
upvoted 0 times
...
...
Herschel
3 months ago
Haha, I bet Donald is regretting not using a self-destructing VM for this forensic analysis. Option C is the only way to be sure!
upvoted 0 times
Pearly
2 months ago
C) Delete the OS disk of the affected VM altogether
upvoted 0 times
...
Rima
2 months ago
B) Delete the snapshot from the source resource group
upvoted 0 times
...
Val
3 months ago
A) Recommend changing the access policies followed by the company
upvoted 0 times
...
...
Alpha
4 months ago
I believe creating another VM using the snapshot would be a good security measure as well.
upvoted 0 times
...
Glennis
4 months ago
I would recommend option A. Changing the access policies could help strengthen the security measures and prevent similar incidents in the future.
upvoted 0 times
Wava
3 months ago
Definitely, security measures need to be strengthened.
upvoted 0 times
...
Peggie
3 months ago
It's important to prevent similar incidents from happening again.
upvoted 0 times
...
Delmy
3 months ago
I agree, changing the access policies is crucial for security.
upvoted 0 times
...
Genevieve
4 months ago
I think option A is the best choice.
upvoted 0 times
...
...
Dianne
4 months ago
I agree with Evette, changing access policies is crucial for security.
upvoted 0 times
...
Dyan
4 months ago
Option B is the way to go. Deleting the snapshot from the source resource group is the prudent move to prevent any further compromise.
upvoted 0 times
Gilbert
3 months ago
B) Delete the snapshot from the source resource group
upvoted 0 times
...
Daren
4 months ago
A) Recommend changing the access policies followed by the company
upvoted 0 times
...
...
Evette
4 months ago
I think Donald should recommend changing the access policies.
upvoted 0 times
...

Save Cancel