New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Arcitura Education C90.02 Exam - Topic 7 Question 108 Discussion

Actual exam question for Arcitura Education's C90.02 exam
Question #: 108
Topic #: 7
[All C90.02 Questions]

A virtual server is being attacked by a malicious cloud service consumer that is generating increased usage loads upon the underlying physical server. As a result, other virtual servers being hosted by the physical server are becoming unavailable to other cloud service consumers. This kind of attack is known as: __________________.

Select the correct answer.

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Tesha
1 month ago
Wow, I didn't know this could happen in cloud environments!
upvoted 0 times
...
Delsie
1 month ago
No way, it's clearly insufficient authorization.
upvoted 0 times
...
Shonda
2 months ago
I thought it was an overlapping trust boundary?
upvoted 0 times
...
Felicidad
2 months ago
That's definitely a denial of service attack!
upvoted 0 times
...
Corrina
2 months ago
I think denial of service makes sense here, especially since it mentions the physical server being affected. I just hope I’m not mixing it up with overlapping trust boundaries.
upvoted 0 times
...
Junita
2 months ago
I’m a bit confused because I’ve seen terms like insufficient authorization pop up in other contexts. But this seems more like a load issue.
upvoted 0 times
...
Maddie
2 months ago
I remember practicing a similar question where we discussed how resource exhaustion can lead to service unavailability. I feel like the answer is definitely denial of service.
upvoted 0 times
...
Kristel
3 months ago
This seems like a classic denial of service scenario to me. The malicious consumer is overloading the physical server, disrupting service to other users. I'm confident A is the right answer here.
upvoted 0 times
...
Effie
3 months ago
Buffer overrun doesn't fit here at all.
upvoted 0 times
...
Noble
3 months ago
I think this is related to denial of service attacks, but I'm not entirely sure if it's specifically about cloud environments.
upvoted 0 times
...
Camellia
3 months ago
I'm a bit confused by the wording here. Is this really a denial of service attack, or could it be something else like an overlapping trust boundary issue? I'll have to review the concepts to make sure I understand this properly.
upvoted 0 times
...
Teresita
3 months ago
Okay, let's see. The question is talking about a malicious cloud consumer overloading the physical server, causing other virtual servers to become unavailable. That sounds like a denial of service attack to me. I'll go with A.
upvoted 0 times
...
Miss
4 months ago
Hmm, I'm a little unsure about this one. Could it be C - insufficient authorization? I'll have to think it through carefully.
upvoted 0 times
...
Lauran
4 months ago
This one seems pretty straightforward. I'm pretty confident the answer is A - denial of service.
upvoted 0 times
...
Latricia
4 months ago
This is straightforward - the question is clearly describing a denial of service attack, so I'll go with option A.
upvoted 0 times
...
Darnell
4 months ago
I'm a bit confused by the wording of this question. Could it be something like an overlapping trust boundary or insufficient authorization? I'll need to re-read it a few times.
upvoted 0 times
...
Cordell
4 months ago
Okay, I think I've got it. The key here is that the malicious cloud service consumer is generating increased usage loads, causing other virtual servers to become unavailable. That sounds like a denial of service attack to me.
upvoted 0 times
...
Chaya
5 months ago
Hmm, I'm not sure if this is a denial of service attack or something else. I'll need to think this through carefully.
upvoted 0 times
...
Jerlene
5 months ago
This looks like a classic denial of service attack. I'll go with option A.
upvoted 0 times
...
Dewitt
11 months ago
I believe it's A) denial of service because the attack is causing other virtual servers to become unavailable.
upvoted 0 times
...
Elenor
11 months ago
A) denial of service. If it looks like a duck and quacks like a duck, it's probably a duck. Or in this case, a very angry, resource-hogging virtual duck.
upvoted 0 times
Howard
9 months ago
D) buffer overrun
upvoted 0 times
...
Jenelle
9 months ago
C) insufficient authorization
upvoted 0 times
...
Vallie
10 months ago
B) overlapping trust boundary
upvoted 0 times
...
Dusti
10 months ago
A) denial of service
upvoted 0 times
...
...
Florencia
11 months ago
This is a tricky one, but I'm going to say A) denial of service. I mean, who else but a bunch of hackers would be playing 'the floor is lava' with a physical server?
upvoted 0 times
...
Carlene
11 months ago
I'm going with A) denial of service. It's the only option that fits the scenario of a malicious user causing the other virtual servers to become unavailable.
upvoted 0 times
...
Lenna
11 months ago
I'm not sure, but I think it could also be C) insufficient authorization.
upvoted 0 times
...
Gaston
11 months ago
I agree with Paulina, denial of service makes sense in this scenario.
upvoted 0 times
...
Eric
11 months ago
I think the answer is A) denial of service. The description matches the symptoms of a DoS attack, where a malicious actor overwhelms the system's resources.
upvoted 0 times
Lindsey
10 months ago
B) overlapping trust boundary
upvoted 0 times
...
Alfred
10 months ago
That's correct. A DoS attack aims to make a server or network resource unavailable to its intended users.
upvoted 0 times
...
Royce
10 months ago
A) denial of service
upvoted 0 times
...
...
Paulina
11 months ago
I think the answer is A) denial of service.
upvoted 0 times
...
Celestina
11 months ago
Definitely a denial of service attack. The question clearly states that other virtual servers are becoming unavailable due to increased usage loads. This is the classic definition of a DoS attack.
upvoted 0 times
Lea
11 months ago
B) overlapping trust boundary
upvoted 0 times
...
Helaine
11 months ago
Yes, you're right. It's definitely a denial of service attack.
upvoted 0 times
...
Leoma
11 months ago
A) denial of service
upvoted 0 times
...
...

Save Cancel