Donald made an OS disk snapshot of a compromised Azure VM under a resource group being used by the affected company as a part of forensic analysis process. He then created a vhd file out of the snapshot and stored it in a file share and as a page blob as backup in a storage account under different region. What Is the next thing he should do as a security measure?
Clarinda
4 months agoLavera
5 months agoStephaine
5 months agoLavonna
5 months agoLea
5 months agoRodolfo
6 months agoSkye
6 months agoReuben
6 months agoRashad
6 months agoAlex
6 months agoEmogene
6 months agoDahlia
6 months agoOlene
6 months agoMaia
6 months agoTamra
2 years agoPilar
1 year agoJulianna
1 year agoBettina
1 year agoHerschel
2 years agoPearly
1 year agoRima
1 year agoVal
1 year agoAlpha
2 years agoGlennis
2 years agoWava
2 years agoPeggie
2 years agoDelmy
2 years agoGenevieve
2 years agoDianne
2 years agoDyan
2 years agoGilbert
2 years agoDaren
2 years agoEvette
2 years ago