Match the cloud attack to the description.

Match the cloud attack to the description.

Match the cloud attack to the description
Match the cloud attack to the description
  • Credential Harvesting ==> Act of gathering and stealing valid usernames, passwords, tokens, PINs, and any other types of credentials through infrastructure breaches
  • Account Takeover ==> When a threat actor gains access to a user or application account and uses it to then gain access to more accounts and information
  • Privilege Escalation ==> Act of exploiting a bug or design flaw in a software or firmware application to gain access to resources that normally would have been protected from an application or a user
Explanation & Hints:

Place the options in the following order:

Credential Harvesting Act of gathering and stealing valid usernames, passwords, tokens, PINs, and any other types of credentials through infrastructure breaches
Privilege Escalation Act of exploiting a bug or design flaw in a software or firmware application to gain access to resources that normally would have been protected from an application or a user
Account Takeover When a threat actor gains access to a user or application account and uses it to then gain access to more accounts and information

For more Questions and Answers:

Ethical Hacker Course Final Exam Answers Full 100%

Leave a Reply