exam questions

Exam SY0-701 All Questions

View all questions & answers for the SY0-701 exam

Exam SY0-701 topic 1 question 327 discussion

Actual exam question from CompTIA's SY0-701
Question #: 327
Topic #: 1
[All SY0-701 Questions]

A systems administrator is concerned about vulnerabilities within cloud computing instances. Which of the following is most important for the administrator to consider when architecting a cloud computing environment?

  • A. SQL injection
  • B. TOC/TOU
  • C. VM escape
  • D. Tokenization
  • E. Password spraying
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
sentinell
1 week, 4 days ago
Selected Answer: C
C. VM escape. VM escape is a critical vulnerability in cloud environments where multiple virtual machines (VMs) share the same physical host. If an attacker successfully exploits a VM escape flaw, they can break out of the isolated VM and gain control over the hypervisor or other VMs—essentially compromising the entire host system. This undermines the core security model of virtualization, which is foundational to cloud computing. Let’s briefly look at the others: - A. SQL injection is a serious application-layer threat, but it’s not unique to cloud architecture. - B. TOC/TOU (Time-of-check to time-of-use) is a race condition issue, more relevant to OS-level programming. - D. Tokenization is a mitigation technique, not a vulnerability. - E. Password spraying is a brute-force attack vector, but it’s more about identity protection than cloud architecture design.
upvoted 1 times
...
Cloudboy
7 months, 1 week ago
GPT C. VM escape Explanation: In a cloud computing environment, particularly one using virtualization, VM escape is a critical vulnerability to consider. It occurs when an attacker exploits a vulnerability in a virtual machine (VM) to "escape" the VM and gain access to the underlying hypervisor or other VMs running on the same physical host. This poses a significant security risk in multi-tenant environments, such as those found in cloud computing.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...