Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 91 Topic 10 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 91 Topic 10 Discussion

312-50v13 Exam Topic 10 Question 91 Discussion:
Question #: 91
Topic #: 10

A fintech startup in Austin, Texas deploys several virtual machines within a public cloud environment. During an authorized cloud security assessment, a tester uploads a small script to one of the instances through a web application vulnerability. After executing the script locally on the instance, the tester retrieves temporary access credentials associated with the instance ' s assigned role. These credentials are then used to enumerate storage resources and access additional cloud services within the same account. Which cloud attack technique best corresponds to this activity?


A.

Cloud Snooper Attack


B.

Wrapping Attack


C.

IMDS Attack


D.

CP DoS Attack


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.