Shaguftausman07go Shaguftausman07go Computers and Technology Answered cybersecurity analysts consider a feasible approach to restoring a compromised cloud-based virtual machine. a recent backup does not exist for the system. which approach do the analysts utilize?