List of questions
Related questions
Question 45 - ECSS discussion
Which of the following cloud computing threats arises from authentication vulnerabilities, user-provisioning and de-provisioning vulnerabilities, hypervisor vulnerabilities, unclear roles and responsibilities, and misconfigurations?
A.
Supply-chain failure
B.
Isolation failure
C.
Subpoena and e discovery
D.
Privilege escalation
Your answer:
0 comments
Sorted by
Leave a comment first