List of questions
Related questions
Question 18 - D-SF-A-24 discussion
In the cloud, there are numerous configuration options for the services provided. If not properly set, these configurations can leave the environment in an unsecure state where an attacker can read and modify the transmitted data packets and send their own requests to the client.
Which types of attack enable an attacker to read and modify the transmitted data packets and send their own requests to the client?
A.
Data loss
B.
Shared technology
C.
TCP hijacking
D.
Dumpster diving
Your answer:
0 comments
Sorted by
Leave a comment first