ExamGecko
Question list
Search
Search

Question 153 - D-ISM-FN-23 discussion

Report
Export

What occurs during a Shared Technology Vulnerability threat?

A.
An attacker gains access to an administrator's, user's or system account.
Answers
A.
An attacker gains access to an administrator's, user's or system account.
B.
An attacker avoids applications that are already approved by an IT organization.
Answers
B.
An attacker avoids applications that are already approved by an IT organization.
C.
An attacker exploits the weaknesses of tools used to enable multi-tenancy.
Answers
C.
An attacker exploits the weaknesses of tools used to enable multi-tenancy.
D.
An attacker exhausts network bandwidth or CPU cycles.
Answers
D.
An attacker exhausts network bandwidth or CPU cycles.
Suggested answer: C
asked 16/09/2024
Deepak PSK
46 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first