shaguftausman07 shaguftausman07 06-12-2022 Computers and Technology contestada cybersecurity analysts consider a feasible approach to restoring a compromised cloud-based virtual machine. a recent backup does not exist for the system. which approach do the analysts utilize?