ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 69 - PT0-002 discussion

Report
Export

A company is concerned that its cloud VM is vulnerable to a cyberattack and proprietary data may be stolen. A penetration tester determines a vulnerability does exist and exploits the vulnerability by adding a fake VM instance to the IaaS component of the client's VM. Which of the following cloud attacks did the penetration tester MOST likely implement?

A.
Direct-to-origin
Answers
A.
Direct-to-origin
B.
Cross-site scripting
Answers
B.
Cross-site scripting
C.
Malware injection
Answers
C.
Malware injection
D.
Credential harvesting
Answers
D.
Credential harvesting
Suggested answer: C

Explanation:

Malware injection is the most likely cloud attack that the penetration tester implemented, as it involves adding a fake VM instance to the IaaS component of the client's VM. Malware injection is a type of attack that exploits vulnerabilities in cloud services or applications to inject malicious code or data into them. The injected malware can then compromise or control the cloud resources or data.

asked 02/10/2024
long tran
33 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first