AWS Certified Security - Specialty (#120)

A Security Engineer received an AWS Abuse Notice listing EC2 instance IDs that are reportedly abusing other hosts. Which action should the Engineer take based on this situation? (Choose three.)

Use AWS Artifact to capture an exact image of the state of each instance.
Create EBS Snapshots of each of the volumes attached to the compromised instances.
Capture a memory dump.
Log in to each instance with administrative credentials to restart the instance.
Revoke all network ingress and egress except for to/from a forensics workstation.
Run Auto Recovery for Amazon EC2.