List of questions
Related questions
Question 69 - PT0-002 discussion
A company is concerned that its cloud VM is vulnerable to a cyberattack and proprietary data may be stolen. A penetration tester determines a vulnerability does exist and exploits the vulnerability by adding a fake VM instance to the IaaS component of the client's VM. Which of the following cloud attacks did the penetration tester MOST likely implement?
A.
Direct-to-origin
B.
Cross-site scripting
C.
Malware injection
D.
Credential harvesting
Your answer:
0 comments
Sorted by
Leave a comment first