Q: 4
A security engineer receives a notice about suspicious activity from a Linux-based Amazon EC2
instance that uses Amazon Elastic Block Store (Amazon EBS)-based storage. The instance is making
connections to known malicious addresses.
The instance is in a development account within a VPC that is in the us-east-1 Region. The VPC
contains an internet gateway and has a subnet in us-east-1a and us-east-1b. Each subnet is
associated with a route table that uses the internet gateway as a default route. Each subnet also uses
the default network ACL. The suspicious EC2 instance runs within the us-east-1b subnet. During an
initial investigation, a security engineer discovers that the suspicious instance is the only instance
that runs in the subnet.
Which response will immediately mitigate the attack and help investigate the root cause?
Options
Discussion
Option C, Official guide and practice exams always say to preserve evidence by detaching EBS, then investigate offline.
Option C Preserve the EBS, terminate the instance, then mount for analysis. Seen similar in exam prep, fits best.
Had something like this in a mock, pretty sure C is right. You want to save the EBS volumes by disabling delete on termination, then kill the compromised box so nothing else leaks. Forensics should always happen offline on a new host for clean analysis. Makes sense?
C B is tempting for speed but you risk losing evidence if you don't preserve the EBS volume for analysis.
AWS loves these preserve-forensics questions, predictable at this point. C
Pretty sure it's C for forensics, but if they only cared about cutting network access maybe B would work too.
C , B looks quick but risks evidence loss. Similar exam questions want forensics so preserving EBS is safer here.
A is wrong, C. Official study guides and AWS whitepapers both talk about preserving EBS volumes for later analysis as best practice here. If you want to see similar logic, check the official practice test questions. Disagree?
Its C, encountered exactly similar question in my exam. This is the forensic-friendly AWS approach.
Preserving evidence is key here, so C
Be respectful. No spam.