Which cloud technology attack method involves breaching the infrastructure to gather and steal information such as valid usernames, passwords, tokens, and PINs?

IT Questions BankCategory: Ethical HackerWhich cloud technology attack method involves breaching the infrastructure to gather and steal information such as valid usernames, passwords, tokens, and PINs?

Which cloud technology attack method involves breaching the infrastructure to gather and steal information such as valid usernames, passwords, tokens, and PINs?

  • account takeover
  • credential harvesting
  • privilege escalation
  • side-channel attacks

Explanation: Credential harvesting is the act of gathering and stealing valid usernames, passwords, tokens, PINs, and any other types of credentials through infrastructure breaches.

Exam with this question: 7.3.3 Quiz - Cloud, Mobile, and IoT Security Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments