New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Arcitura Education C90.02 Exam - Topic 1 Question 118 Discussion

Actual exam question for Arcitura Education's C90.02 exam
Question #: 118
Topic #: 1
[All C90.02 Questions]

Messages being sent from a cloud service consumer to a cloud service are intercepted and maliciously altered by an intermediary service. This is an example of which cloud security threat?

Select the correct answer.

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Jettie
3 days ago
I thought it was a virtualization attack at first.
upvoted 0 times
...
Christiane
8 days ago
That's definitely a man-in-the-middle attack!
upvoted 0 times
...
Charolette
13 days ago
C) virtualization attack. The cloud service is probably running on a virtualized platform, so that's gotta be it.
upvoted 0 times
...
Katheryn
19 days ago
Haha, I bet the cloud service provider is really regretting their security choices right about now.
upvoted 0 times
...
Dick
24 days ago
B) insufficient authorization. The intermediary service is clearly not authorized to access or modify those messages.
upvoted 0 times
...
Eveline
29 days ago
D) None of the above. This sounds more like a man-in-the-middle attack to me, not any of the options provided.
upvoted 0 times
...
Rosamond
1 month ago
I think the correct answer is A) denial of service. Intercepting and altering messages seems like a classic DoS attack.
upvoted 0 times
...
Kasandra
1 month ago
I don't think it's any of the options given. It seems like a unique scenario that doesn't fit neatly into those categories.
upvoted 0 times
...
Erick
1 month ago
I’m a bit confused. Could it be denial of service? I feel like that was mentioned in a similar context during our study sessions.
upvoted 0 times
...
Hermila
2 months ago
I've got a good feeling about this one. The description sounds like a classic man-in-the-middle attack, so I'm going with D. None of the above.
upvoted 0 times
...
Ettie
2 months ago
I'm a bit confused on this one. I'll need to review my notes on cloud security threats to figure out the best approach.
upvoted 0 times
...
Jacquline
2 months ago
Okay, the question is talking about messages being intercepted and altered, so I'm pretty sure the answer is C. virtualization attack.
upvoted 0 times
...
Felix
2 months ago
I think it's a virtualization attack. Sounds right.
upvoted 0 times
...
Shannan
3 months ago
I remember a practice question about message interception, and I think it was linked to a virtualization attack. But this feels different.
upvoted 0 times
...
Ollie
3 months ago
I think this might be related to insufficient authorization, but I'm not entirely sure. It sounds like the messages are being tampered with.
upvoted 0 times
...
Elsa
3 months ago
Hmm, I'm not sure about this one. I'll have to think it through carefully before answering.
upvoted 0 times
...
Sylvie
3 months ago
I think this is a man-in-the-middle attack, so the correct answer is D. None of the above.
upvoted 0 times
Ernestine
2 months ago
But isn't that more about interception?
upvoted 0 times
...
Percy
3 months ago
I agree, it sounds like a man-in-the-middle attack.
upvoted 0 times
...
...

Save Cancel