New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Arcitura Education C90.03 Exam - Topic 3 Question 19 Discussion

Actual exam question for Arcitura Education's C90.03 exam
Question #: 19
Topic #: 3
[All C90.03 Questions]

Cloud X (owned by Cloud Provider X) provides Physical Server A which hosts Virtual Servers A and B. Virtual Server B hosts Ready-Made Environments A and B. Cloud Service Consumer A uses Virtual Server A as part of an IaaS leasing agreement in which Cloud Consumer A is charged a fixed monthly fee for unlimited access. Cloud Service Consumers B and C use Ready-Made Environments A and B respectively as part of a PaaS leasing agreement based on per-minute usage fees. In both cases, access is monitored via Pay-For-Use Monitor A, which keeps track of log-in and log-out times in order to calculate the usage charges that are billed to Cloud Consumers B and C . Virtual Server A begins generating a series of exceptions. Soon thereafter, Virtual Server B becomes destabilized, resulting in further exceptions being raised in Ready-Made Environments A and B. Cloud Service Consumers B and C receive a series of error messages until both of their connections are dropped Finally, Physical Server A shuts down completely. A subsequent investigation reveals that Virtual Server A was the victim of a security attack performed by a malicious cloud service consumer, the attacker generated increased loads of external communication requests on Virtual Server A and the underlying network, causing Physical Server A (along with Virtual Server B) to eventually shut down.

Which of the following statements accurately identifies the type of security threat that corresponds to the described attack - and -provides a solution that can directly mitigate this type of security threat within Cloud X?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Myra
4 months ago
Surprised it escalated to a complete shutdown!
upvoted 0 times
...
Carman
4 months ago
I thought encryption would help, but it’s not the main issue here.
upvoted 0 times
...
Willie
4 months ago
Wait, insufficient authorization? That doesn't fit the scenario.
upvoted 0 times
...
Thaddeus
4 months ago
I agree, option C seems right to me!
upvoted 0 times
...
Charlette
4 months ago
Sounds like a classic denial of service attack.
upvoted 0 times
...
Jodi
5 months ago
I vaguely remember that a hardened virtual server image could help with security, but I'm not clear on how it relates to denial of service versus authorization issues.
upvoted 0 times
...
Xuan
5 months ago
I think the attack described is definitely a denial of service, but I'm confused about the best mitigation. I thought encryption wasn't really a solution for that.
upvoted 0 times
...
Bev
5 months ago
I feel like this scenario is similar to a practice question we did about insufficient authorization. But I can't recall the specific mitigation strategies mentioned.
upvoted 0 times
...
Glendora
5 months ago
I remember studying denial of service attacks and how they can overwhelm a server. I think option A might be the right choice, but I'm not completely sure.
upvoted 0 times
...
Hershel
5 months ago
I think the key here is enabling real-time collaboration, so Slack does seem like the best option. The question specifically mentions "real time", so that rules out email threads.
upvoted 0 times
...
Hoa
5 months ago
The customer needs to get in touch with the sales team right away. Sounds like they need to upgrade their license to handle the increased ingest rate.
upvoted 0 times
...
Stephen
5 months ago
I think this is a straightforward question about cloud networking services. I'll focus on understanding the key differences between the options.
upvoted 0 times
...
Rebbecca
5 months ago
I'm a little confused by this one. The options don't seem to clearly match the requirement of making Router 2 a server-only mode. I'll need to re-read the question and think through the logic carefully before selecting an answer.
upvoted 0 times
...
Kristofer
5 months ago
Hmm, this looks like a hypothesis testing question. I'll need to carefully review the data and determine the appropriate statistical test to use.
upvoted 0 times
...

Save Cancel