A malicious cloud service consumer circumvents the authentication enforced by the virtual server and manages to attack the underlying hardware directly. This is an example of which cloud security threat? Select the correct answer.
I'm a bit confused by the terminology here. What's the difference between a Principal AW machine and a Secondary AW machine? I'll have to review my notes to figure this out.
I'm a bit unsure about this one. I know CWE has something to do with software weaknesses, but I can't remember if that's the exact answer. I'll have to think this through carefully.
I think the answer is A, that ensuring staff get a variety of experiences is not really why we'd segregate duties. But I'm not completely sure if that's the only reason.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Alyssa
4 months agoDick
4 months agoCharlie
4 months agoMelissia
4 months agoDaryl
5 months agoElouise
5 months agoKasandra
5 months agoMarsha
5 months agoLeota
5 months ago