Match the cloud attack to the description.

IT Questions BankCategory: Ethical HackerMatch the cloud attack to the description.

Match the cloud attack to the description.

Place the options in the following order:

Credential Harvesting act of gathering and stealing valid usernames, passwords, tokens, PINs, and any other types of credentials through infrastructure breaches
Privilege Escalation act of exploiting a bug or design flaw in a software or firmware application to gain access to resources that normally would have been protected from an application or a user
Account Takeover when a threat actor gains access to a user or application account and uses it to then gain access to more accounts and information

Exam with this question: Ethical Hacker: Course Final Exam Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments