List of questions
Related questions
Question 7 - PT0-003 discussion
In a cloud environment, a security team discovers that an attacker accessed confidential information that was used to configure virtual machines during their initialization. Through which of the following features could this information have been accessed?
A.
IAM
B.
Block storage
C.
Virtual private cloud
D.
Metadata services
Your answer:
0 comments
Sorted by
Leave a comment first