ExamGecko
Question list
Search
Search

Related questions











Question 437 - 312-50v12 discussion

Report
Export

Thomas, a cloud security professional, is performing security assessment on cloud services to identify any loopholes. He detects a vulnerability in a bare-metal cloud server that can enable hackers to implant malicious backdoors in its firmware. He also identified that an installed backdoor can persist even if the server is reallocated to new clients or businesses that use it as an laaS.

What is the type of cloud attack that can be performed by exploiting the vulnerability discussed in the above scenario?

A.
Man-in-the-cloud (MITC) attack
Answers
A.
Man-in-the-cloud (MITC) attack
B.
Cloud cryptojacking
Answers
B.
Cloud cryptojacking
C.
Cloudborne attack
Answers
C.
Cloudborne attack
D.
Metadata spoofing attack
Answers
D.
Metadata spoofing attack
Suggested answer: C
asked 18/09/2024
Martin Stoyanov
50 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first