rcolon8126 rcolon8126 24-11-2022 Computers and Technology contestada cybersecurity analysts consider a feasible approach to restoring a compromised cloud-based virtual machine. a recent backup does not exist for the system. which approach do the analysts utilize?