Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 308 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 308
Topic #: 1
[All 312-50v12 Questions]

Thomas, a cloud security professional, is performing security assessment on cloud services to identify any loopholes. He detects a vulnerability in a bare-metal cloud server that can enable hackers to implant malicious backdoors in its firmware. He also identified that an installed backdoor can persist even if the server is reallocated to new clients or businesses that use it as an IaaS.

What is the type of cloud attack that can be performed by exploiting the vulnerability discussed in the above scenario?

  • A. Cloudborne attack
  • B. Man-in-the-cloud (MITC) attack
  • C. Metadata spoofing attack
  • D. Cloud cryptojacking
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
shaody
3 months ago
Selected Answer: A
Cloudborne attack is an attack in a bare-metal cloud server that implants a malicious backdoor in its firmware
upvoted 1 times
...
prasoonmk
3 months, 3 weeks ago
Selected Answer: A
Cloudborne IaaS Attack Allows Persistent Backdoors in the Cloud A known vulnerability combined with a weakness in bare-metal server reclamation opens the door to powerful, high-impact attacks. An attack scenario affecting various cloud providers could allow an attacker to implant persistent backdoors for data theft into bare-metal cloud servers, which would be able to remain intact as the cloud infrastructure moves from customer to customer. This opens the door to a wide array of attacks on businesses that use infrastructure-as-a-service (IaaS) offerings.
upvoted 1 times
...
insaniunt
9 months ago
Selected Answer: A
A- Cloudborne attack involves compromising the underlying infrastructure, such as firmware vulnerabilities
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...