Pg 31 PCCET Study Guide
While it's true that East-West traffic (traffic within a private cloud) might not be as exposed to external threats as North-South traffic (traffic between the private cloud and the internet), it's still crucial to protect it. Here's why:
Internal threats: Even within a private cloud, there are risks of data breaches, unauthorized access, and other security incidents that can originate from internal sources.
Data sensitivity: East-West traffic often involves sensitive data that needs to be protected from unauthorized access and disclosure.
Compliance requirements: Many regulations and industry standards require organizations to implement strong security measures to protect their data, regardless of whether the traffic is internal or external.
"Weaponization: Next, attackers determine which methods to use to compromise a target
endpoint. They may choose to embed intruder code within seemingly innocuous files such
as a PDF or Microsoft Word document or email message."
Should be A,
Page 39 study guide.
Weaponization: They may choose to embed intruder code within seemingly innocuous files such as a PDF or Microsoft Word document
Delivery: Attackers next attempt to deliver their weaponized payload to a target endpoint
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
[Removed]
Highly Voted 3 years agoerror_909
2 years, 10 months agoerror_909
2 years, 10 months agokirmanis
Most Recent 3 months, 4 weeks agocsco10320953
2 years agophil155
2 years, 4 months agoblahblah1234567890000
2 years, 5 months agoMerlin0o
2 years, 5 months agon3etw0
2 years, 8 months agoerror_909
2 years, 10 months agoerror_909
2 years, 10 months ago