Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Computer Hacking Forensic Investigator (CHFIv11) 312-49v11 Question # 52 Topic 6 Discussion

ECCouncil Computer Hacking Forensic Investigator (CHFIv11) 312-49v11 Question # 52 Topic 6 Discussion

312-49v11 Exam Topic 6 Question 52 Discussion:
Question #: 52
Topic #: 6

During an investigation of anomalous CPU timing patterns on a compromised virtual machine hosted by a telecom provider, forensic analysts discover that the attacker launched a malicious VM on the same physical host as the target instance and extracted cryptographic keys by analyzing shared cache behavior. Which type of cloud computing attack does this technique represent?


A.

Side-Channel Attack


B.

Service Hijacking via Network Sniffing


C.

Service Hijacking via Social Engineering


D.

Wrapping Attack


Get Premium 312-49v11 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.