Which of the following cloud attacks did the penetration tester MOST likely implement?

A company is concerned that its cloud VM is vulnerable to a cyberattack and proprietary data may be stolen. A penetration tester determines a vulnerability does exist and exploits the vulnerability by adding a fake VM instance to the IaaS component of the client’s VM. Which of the following cloud attacks did the penetration tester MOST likely implement?
A. Direct-to-origin
B. Cross-site scripting
C. Malware injection
D. Credential harvesting

comptia-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.