Which of the following cloud attacks did the penetration tester MOST likely implement?
A company is concerned that its cloud VM is vulnerable to a cyberattack and proprietary data may be stolen. A penetration tester determines a vulnerability does exist and exploits the vulnerability by adding a fake VM instance to the IaaS component of the client’s VM.
Which of the following cloud attacks did the penetration tester MOST likely implement?
A . Direct-to-origin
B. Cross-site scripting
C. Malware injection
D. Credential harvesting
Answer: D
Latest PT0-002 Dumps Valid Version with 110 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments