Disagree with protocol vulnerabilities. The answer is about insecure implementation of API
https://www.imperva.com/blog/top-10-cloud-security-concerns/
When using an Internet browser to access cloud-based services, the primary risk is vulnerabilities within the communication protocols (e.g., HTTP, HTTPS, TLS, or WebSockets). Attackers can exploit these vulnerabilities through man-in-the-middle (MITM) attacks, SSL/TLS weaknesses, or browser-based exploits.
I think it is about securing APIs. A web API can be accessed via web browser.
https://stackoverflow.com/questions/29105007/how-to-make-basic-rest-api-calls-using-a-browser
insecure API:
A malicious user gained access to an organization's database from a cloud-base application programming interface that lacked strong authentication control. (from 350 - 701 practice exam)
Vulnerabilities within protocol:
Cross-site scripting (XSS) vulnerabilities: These allow attackers to inject malicious scripts into web pages viewed by other users.
Should be D.
A poorly designed or implemented API could allow users accessing confidential data unintentionally, e.g. with a typo in the address box of a browser.
A. Wrong. Misconfiged infra, not specificly vulnerable to browsers
B. Wrong. not that significant, although it is an availability issue in security perspective, but also nothing to do with a browser.
C. Wrong, vulnerable within protocol? then which protocol? specific to a browser? then should be http or https, however, that also affects non-cloud-based services as well, right?
A - Misconfiguration of Infra, which leads to unauthorized access is CORRECT for me --> it joins 2 most often security issues of public cloud in one answer (see link below)
Question states BROWSER so API is probably not an option (D).
Vulnerabilities within protocol (C) - this is not specific to cloud, PROTOCOLS are being used everywhere and they are years old tuned standards with minimum vulnerabilities.
Option B - connection stability (?) --> means service availability, which is also security aspect but it is not such a big issue as option A and networks are reliable today (risk is DoS / DDoS but they are not asking about it).
A is correct.
https://www.checkpoint.com/cyber-hub/cloud-security/what-is-cloud-security/top-cloud-security-issues-threats-and-concerns/
That is also my answer. You are responsible for configuring users and authentication / authorization for your Cloud, so if you do that in a dumb way it is insecure. Your AWS instances might be publicly reachable for SSL with a Cisco123 password - what do you think ?
Vulnerabilities within protocols that can expose confidential data. That is C! not D
upvoted 3 times
...
...
This section is not available anymore. Please use the main Exam Page.350-701 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
zheka
Highly Voted 3 years, 4 months agodummyy
3 years, 2 months ago[Removed]
1 year, 2 months agoIarn
2 years, 12 months agomadboy2
Most Recent 1 month, 1 week agokloug
6 months agoPremium_Pils
8 months, 2 weeks ago4pelos
1 year, 1 month agoxziomal9
1 year, 5 months agozamkljo
1 year, 10 months agostalkr3
2 years agoTuxzinator
2 years, 2 months agoZatingke
2 years, 2 months agoEmlia1
2 years, 4 months agoFortiSherlock
2 years, 8 months agoNikoNiko
2 years, 9 months agoFortiSherlock
2 years, 8 months agoSparrsh
3 years agoIarn
2 years, 12 months ago