A company is concerned that its cloud VM is vulnerable to a cyberattack and proprietary data may be stolen. A penetration tester determines a vulnerability does exist and exploits the vulnerability by adding a fake VM instance to the IaaS component of the client's VM. Which of the following cloud attacks did the penetration tester MOST likely implement?
tokhs
Highly Voted 3Â years, 8Â months agoBinarySoldier
Highly Voted 3Â years, 6Â months agomaigoya
Most Recent 1Â year agoafazaeli
1Â year, 7Â months agojp2137
2Â years, 8Â months agoRVP20
3Â years, 6Â months ago[Removed]
3Â years, 4Â months agorogal
3Â years, 8Â months ago