List of questions
Related questions
Question 437 - 312-50v12 discussion
Thomas, a cloud security professional, is performing security assessment on cloud services to identify any loopholes. He detects a vulnerability in a bare-metal cloud server that can enable hackers to implant malicious backdoors in its firmware. He also identified that an installed backdoor can persist even if the server is reallocated to new clients or businesses that use it as an laaS.
What is the type of cloud attack that can be performed by exploiting the vulnerability discussed in the above scenario?
A.
Man-in-the-cloud (MITC) attack
B.
Cloud cryptojacking
C.
Cloudborne attack
D.
Metadata spoofing attack
Your answer:
0 comments
Sorted by
Leave a comment first