ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 45 - ECSS discussion

Report
Export

Which of the following cloud computing threats arises from authentication vulnerabilities, user-provisioning and de-provisioning vulnerabilities, hypervisor vulnerabilities, unclear roles and responsibilities, and misconfigurations?

A.

Supply-chain failure

Answers
A.

Supply-chain failure

B.

Isolation failure

Answers
B.

Isolation failure

C.

Subpoena and e discovery

Answers
C.

Subpoena and e discovery

D.

Privilege escalation

Answers
D.

Privilege escalation

Suggested answer: D

Explanation:

The cloud computing threat described in the question arises from various vulnerabilities and misconfigurations related to authentication, user provisioning, hypervisors, and roles.Privilege escalationoccurs when an attacker gains more privileges than initially acquired. In this context, it refers to unauthorized elevation of access rights within a cloud environment.The mentioned vulnerabilities contribute to this risk, allowing an attacker to escalate their privileges beyond what is intended.Reference: EC-Council Certified Security Specialist (E|CSS) documents and study guide12.

asked 24/10/2024
Billy Raymond
31 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first