Messages being sent from a cloud service consumer to a cloud service are intercepted and maliciously altered by an intermediary service. This is an example of which cloud security threat?
Select the correct answer.
Answer : D
A virtual server is being attacked by a malicious cloud service consumer that is generating increased usage loads upon the underlying physical server. As a result, other virtual servers being hosted by the physical server are becoming unavailable to other cloud service consumers. This kind of attack is known as: __________________.
Select the correct answer.
Answer : A
A cloud service built as a SOAP-based Web service will have a service contract that is physically decoupled from the service's logic.
Select the correct answer.
Answer : A
The resource replication mechanism can encompass a hypervisor that can support the multitenancy cloud characteristic.
Select the correct answer.
Answer : A
Which of the following can be the result of a successful malicious intermediary attack?
SELECT ALL THAT APPLY
Answer : A, B, C, D
Which of the following security threats is classified as a data-oriented threat?
Select the correct answer.
Answer : B
A human working for a cloud consumer can access a virtual server to set up or maintain a cloud service that belongs to the cloud consumer.
Select the correct answer.
Answer : A