An attacker gains unauthorized access to a virtual server in a public cloud. Which of the following statements about the attack can be true?
a. The attacker is an anonymous, non-trusted cloud service consumer.
b. The attacker is a cloud service consumer that resides outside of the cloud, in an on-premise environment.
c. The attacker is a cloud service consumer that resides in a different cloud.
d. All of the above.
Statement (a) is correct because unauthorized access can be gained by a non-trusted cloud service consumer.
Statement (b) is correct because the malicious cloud service consumer can attempt to gain unauthorized access from any remote location.
Statement (c) is correct because the malicious cloud service consumer can attempt to gain unauthorized access for any remote location, including another cloud environment.
Statement (d) is correct because statements (a), (b) and (c) are correct.
You might also like to view...
Which of the following is a special variable containing a string that identifies the type of operating system on which a script is executed?
A. RUBY_SYSTEM B. RUBY_PLATFORM C. RUBY_OSTYPE D. RUBY_TYPE
The classification designation of government documents is typically Top Secret, Secret, Unusual, Confidential, and Unclassified.
Answer the following statement true (T) or false (F)