List of questions
Related questions
Question 11 - ECSS discussion
Kevin, an attacker, is attempting to compromise a cloud server. In this process, Kevin intercepted the SOAP messages transmitted between a user and the server, manipulated the body of the message, and then redirected it to the server as a legitimate user to gain access and run malicious code on the cloud server.
Identify the attack initiated by Kevin on the target cloud server.
A.
Side-channel attack
B.
Wrapping attack
C.
Cross guest VM breaches
D.
DNS spoofing
Your answer:
0 comments
Sorted by
Leave a comment first