List of questions
Related questions
Question 153 - D-ISM-FN-23 discussion
What occurs during a Shared Technology Vulnerability threat?
A.
An attacker gains access to an administrator's, user's or system account.
B.
An attacker avoids applications that are already approved by an IT organization.
C.
An attacker exploits the weaknesses of tools used to enable multi-tenancy.
D.
An attacker exhausts network bandwidth or CPU cycles.
Your answer:
0 comments
Sorted by
Leave a comment first