An attacker gains unauthorized access to a virtual server in a public cloud. Which of the following statements about the attack can be true?

a. The attacker is an anonymous, non-trusted cloud service consumer.
b. The attacker is a cloud service consumer that resides outside of the cloud, in an on-premise environment.
c. The attacker is a cloud service consumer that resides in a different cloud.
d. All of the above.


Statement (a) is correct because unauthorized access can be gained by a non-trusted cloud service consumer.

Statement (b) is correct because the malicious cloud service consumer can attempt to gain unauthorized access from any remote location.


Statement (c) is correct because the malicious cloud service consumer can attempt to gain unauthorized access for any remote location, including another cloud environment.

Statement (d) is correct because statements (a), (b) and (c) are correct.

Computer Science & Information Technology

You might also like to view...

Lossy audio formats include FLAC, M4A, and MPEG-4.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When the call by reference using reference parameters technique is used for passing a variable's address to a function, which operator is used in the function header line and prototype to indicate reference variables?

A. -> B. >> C. * D. &

Computer Science & Information Technology

A(n) ____________________ is a basic artistic element that places an outline on an object or on type.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

?In what state is sending unsolicited e-mail illegal?

A. ?Florida B. ?Washington C. ?Maine D. ?New York

Computer Science & Information Technology