Donald made an OS disk snapshot of a compromised Azure VM under a resource group being used by the affected company as a part of forensic analysis process. He then created a vhd file out of the snapshot and stored it in a file share and as a page blob as backup in a storage account under different region. What Is the next thing he should do as a security measure?
Clarinda
3 months agoLavera
3 months agoStephaine
3 months agoLavonna
4 months agoLea
4 months agoRodolfo
4 months agoSkye
4 months agoReuben
4 months agoRashad
5 months agoAlex
5 months agoEmogene
5 months agoDahlia
5 months agoOlene
5 months agoMaia
5 months agoTamra
1 year agoPilar
1 year agoJulianna
1 year agoBettina
1 year agoHerschel
1 year agoPearly
1 year agoRima
1 year agoVal
1 year agoAlpha
1 year agoGlennis
1 year agoWava
1 year agoPeggie
1 year agoDelmy
1 year agoGenevieve
1 year agoDianne
1 year agoDyan
1 year agoGilbert
1 year agoDaren
1 year agoEvette
1 year ago