Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Arcitura Education C90.02 Exam - Topic 1 Question 118 Discussion

Actual exam question for Arcitura Education's C90.02 exam
Question #: 118
Topic #: 1
[All C90.02 Questions]

Messages being sent from a cloud service consumer to a cloud service are intercepted and maliciously altered by an intermediary service. This is an example of which cloud security threat?

Select the correct answer.

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Hildegarde
5 days ago
But what if it's none of the above? Could be a trick question.
upvoted 0 times
...
Christiane
10 days ago
I lean towards virtualization attack too. Makes sense.
upvoted 0 times
...
Sabra
15 days ago
Definitely not denial of service. That’s different.
upvoted 0 times
...
Gail
20 days ago
I disagree, it feels more like insufficient authorization.
upvoted 0 times
...
Beatriz
25 days ago
I disagree, it could be insufficient authorization too.
upvoted 0 times
...
Jonell
1 month ago
Surprised this isn't more widely known!
upvoted 0 times
...
Lacey
1 month ago
No way, it's not denial of service for sure.
upvoted 0 times
...
Jettie
2 months ago
I thought it was a virtualization attack at first.
upvoted 0 times
...
Christiane
2 months ago
That's definitely a man-in-the-middle attack!
upvoted 0 times
...
Charolette
2 months ago
C) virtualization attack. The cloud service is probably running on a virtualized platform, so that's gotta be it.
upvoted 0 times
...
Katheryn
2 months ago
Haha, I bet the cloud service provider is really regretting their security choices right about now.
upvoted 0 times
...
Dick
2 months ago
B) insufficient authorization. The intermediary service is clearly not authorized to access or modify those messages.
upvoted 0 times
...
Eveline
3 months ago
D) None of the above. This sounds more like a man-in-the-middle attack to me, not any of the options provided.
upvoted 0 times
...
Rosamond
3 months ago
I think the correct answer is A) denial of service. Intercepting and altering messages seems like a classic DoS attack.
upvoted 0 times
...
Kasandra
3 months ago
I don't think it's any of the options given. It seems like a unique scenario that doesn't fit neatly into those categories.
upvoted 0 times
...
Erick
3 months ago
I’m a bit confused. Could it be denial of service? I feel like that was mentioned in a similar context during our study sessions.
upvoted 0 times
...
Hermila
3 months ago
I've got a good feeling about this one. The description sounds like a classic man-in-the-middle attack, so I'm going with D. None of the above.
upvoted 0 times
...
Ettie
4 months ago
I'm a bit confused on this one. I'll need to review my notes on cloud security threats to figure out the best approach.
upvoted 0 times
...
Jacquline
4 months ago
Okay, the question is talking about messages being intercepted and altered, so I'm pretty sure the answer is C. virtualization attack.
upvoted 0 times
...
Felix
4 months ago
I think it's a virtualization attack. Sounds right.
upvoted 0 times
...
Shannan
4 months ago
I remember a practice question about message interception, and I think it was linked to a virtualization attack. But this feels different.
upvoted 0 times
...
Ollie
5 months ago
I think this might be related to insufficient authorization, but I'm not entirely sure. It sounds like the messages are being tampered with.
upvoted 0 times
...
Elsa
5 months ago
Hmm, I'm not sure about this one. I'll have to think it through carefully before answering.
upvoted 0 times
...
Sylvie
5 months ago
I think this is a man-in-the-middle attack, so the correct answer is D. None of the above.
upvoted 0 times
Ernestine
4 months ago
But isn't that more about interception?
upvoted 0 times
...
Percy
5 months ago
I agree, it sounds like a man-in-the-middle attack.
upvoted 0 times
...
...

Save Cancel