A threat actor has compromised a VM in a cloud environment that shares the same physical hardware as non-compromised VMs. Which cloud technology attack method could now be used to exfiltrate credentials, cryptographic keys, and other sensitive information?
- side-channel attack
- cloud malware injection attack
- resource exhaustion attack
- account takeover
Explanation: Side-channel attacks are often based on information gained from implementing the underlying computer system (or cloud environment) instead of a specific weakness in the implemented technology or algorithm.
Exam with this question: 7.3.3 Quiz - Cloud, Mobile, and IoT Security Answers
Please login or Register to submit your answer