اختبار شهادة Certified Ethical Hacker (CEH) V13

السؤال 242 من 270

كل الأسئلة

Alice compromises a managed service provider (MSP) by spear-phishing and custom malware, then uses the MSP’s access to pivot into customers’ cloud environments and steal their data. Which cloud attack is this scenario describing?

الخيارات

  • A Cloud hopper attack
  • B Cloud cryptojacking
  • C Cloudborne attack
  • D Man-in-the-cloud (MITC) attack

النقاشات

لا توجد نقاشات منشورة لهذا السؤال حالياً.