exam questions

Exam CCSK All Questions

View all questions & answers for the CCSK exam

Exam CCSK topic 1 question 35 discussion

Actual exam question from CSA's CCSK
Question #: 35
Topic #: 1
[All CCSK Questions]

ENISA: `VM hopping` is:

  • A. Improper management of VM instances, causing customer VMs to be commingled with other customer systems.
  • B. Looping within virtualized routing systems.
  • C. Lack of vulnerability management standards.
  • D. Using a compromised VM to exploit a hypervisor, used to take control of other VMs.
  • E. Instability in VM patch management causing VM routing errors.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Crotofroto
2 months, 3 weeks ago
Selected Answer: D
ENISA page 54: Another scenario is ‘VM hopping’: in which an attacker hacks a VM using some standard method and then – exploiting some hypervisor vulnerability – takes control of other VMs running on the same hypervisor.
upvoted 4 times
...
negevon
4 months, 2 weeks ago
The closest answer is B - looping within the same hypervisor/physical host. D is closest to the ENISA wording but it foundationally wrong as it claims "Using a compromised VM to exploit a hypervisor". VM hopping normally does not involve exploiting the hypervisor but using an existing vulnerability that allows traffic to go where it is not supposed to go. That passive use, rather than active exploit makes D foundationally wrong
upvoted 1 times
riee02
3 months, 2 weeks ago
since que talks about Enisa D is correct answer
upvoted 2 times
...
...
Brainiac
7 months ago
The correct description of VM hopping according to ENISA (European Union Agency for Cybersecurity) is: D. Using a compromised VM to exploit a hypervisor, used to take control of other VMs. VM hopping refers to a scenario where a compromised virtual machine (VM) is used as a stepping stone to exploit vulnerabilities in the hypervisor or virtualization layer. The attacker aims to gain control over the hypervisor, which manages and oversees the execution of multiple VMs, and subsequently take control of other VMs hosted on the same hypervisor. By compromising one VM, the attacker attempts to "hop" from that initial foothold to gain unauthorized access to other VMs or critical resources within the virtualized environment. This type of attack can have severe consequences as it allows the attacker to move laterally across VMs and potentially compromise the entire virtualized infrastructure.
upvoted 2 times
...
JoAsiaGje
8 months, 1 week ago
Selected Answer: D
ENISA (page 54) "‘VM hopping’: in which an attacker hacks a VM using some standard method and then – exploiting some hypervisor vulnerability – takes control of other VMs running on the same hypervisor"
upvoted 4 times
...
Azo_4952
1 year, 1 month ago
Virtual machine hyper jumping (VM jumping) is an attack method that exploits the hypervisor’s weakness that allows a virtual machine (VM) to be accessed from another.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago