Which two misconfigured cloud authentication methods could leverage a cloud asset? (Choose two.)

IT Questions BankCategory: Ethical HackerWhich two misconfigured cloud authentication methods could leverage a cloud asset? (Choose two.)

Which two misconfigured cloud authentication methods could leverage a cloud asset? (Choose two.)

  • federated authentication
  • biometric authentication
  • identity and access management (IAM) implementations
  • Intelligent Platform Management Interface (IPMI)
  • local authentication

Explanation: Attackers can leverage misconfigured cloud assets in several ways, including the following:
- Misconfigured identity and access management (IAM) implementations
- Federation misconfigurations

Exam with this question: Ethical Hacker: Course Final Exam Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments