Multiple Choice
A company that utilizes an IaaS service provider has contracted with a vendor to perform a penetration test on its environment. The vendor is able to exploit the virtualization layer and obtain access to other instances within the cloud provider's environment that do not belong to the company. Which of the following BEST describes this attack?
A) VM escape
B) Directory traversal
C) Buffer overflow
D) Heap spraying
Correct Answer:

Verified
Correct Answer:
Verified
Q5: A company is currently running a website
Q6: A VDI administrator has received reports of
Q7: A systems administrator recently upgraded the processors
Q8: An engineer is responsible for configuring a
Q9: A VDI administrator has received reports from
Q11: A system administrator is migrating a bare-metal
Q12: Some VMs that are hosted on a
Q13: Which of the following service models would
Q14: A company needs to access the cloud
Q15: An IaaS provider has numerous devices and