Free CCCP-001 Exam Braindumps (page: 37)

Page 36 of 114

The ___________________ attack occurs when access is granted to an attacker erroneously or too broadly, resulting in the attacker gaining access to IT resources that are normally protected.

  1. denial of service
  2. malicious intermediary
  3. insufficient authorization
  4. virtualization

Answer(s): C



Cloud Service A resides on Virtual Server A and Cloud Service B resides on Virtual Server B. Both virtual servers are hosted by the same physical server and the trust boundaries of Cloud Services A and B overlap. A cloud service consumer successfully uses Cloud Service A to gain access to the underlying physical server. This enables the cloud service consumer to attack Cloud Service B, which negatively affects the cloud service consumers of Cloud Service B. This is an example of which cloud security threat?

  1. denial of service
  2. insufficient authorization
  3. weak authorization
  4. None of the above.

Answer(s): D



A malicious cloud service consumer circumvents the authentication enforced by the virtual server and manages to attack the underlying hardware directly. This is an example of which cloud security threat?

  1. denial of service
  2. insufficient authorization
  3. information leakage
  4. None of the above.

Answer(s): D



A cloud provider grants cloud consumers administrative access to a virtual server. One of the cloud consumers deploys a cloud service consumer that abuses its administrative access to exploit the underlying physical server. This kind of attack is known as: __________________ .

  1. buffer overrun
  2. weak authorization
  3. virtualization attack
  4. information leakage

Answer(s): C






Post your Comments and Discuss GAQM CCCP-001 exam with other Community members:

CCCP-001 Discussions & Posts