Free CCCP-001 Exam Braindumps (page: 39)

Page 38 of 114

Which of the following can be the result of a successful malicious intermediary attack?

  1. The confidentiality of a message is comprised.
  2. The integrity of a message is comprised.
  3. Private or sensitive data within a message is accessed by the attacker.
  4. Harmful data is inserted into a message.

Answer(s): A,B,C,D



A successful attack on a virtual server within a public cloud will negatively impact multiple cloud consumers, as long as none of the cloud consumers share the same trust boundary that encompasses the underlying physical server.

  1. True
  2. False

Answer(s): B



When a pay-for-use mechanism is in place, a denial of service attack can target IT resources leased to a specific cloud consumer, resulting in the cloud consumer being charged for the extra usage.

  1. True
  2. False

Answer(s): A



F1. Encryption is a security mechanism used to realize __________________.

  1. availability
  2. authentication
  3. confidentiality
  4. None of the above.

Answer(s): C






Post your Comments and Discuss GAQM CCCP-001 exam with other Community members:

CCCP-001 Discussions & Posts