cybersecurity analysts consider a feasible approach to restoring a compromised cloud-based virtual machine. a recent backup does not exist for the system. which approach do the analysts utilize?