Which two misconfigured cloud authentication methods could leverage a cloud asset? (Choose two.)
- federated authentication
- biometric authentication
- identity and access management (IAM) implementations
- Intelligent Platform Management Interface (IPMI)
- local authentication
Explanation: Attackers can leverage misconfigured cloud assets in several ways, including the following:
- Misconfigured identity and access management (IAM) implementations
- Federation misconfigurations
Exam with this question: Ethical Hacker: Course Final Exam Answers
Please login or Register to submit your answer