Shared Tenancy Vulnerabilities.
In a multi-tenant environment, such as the cloud, a “container” vulnerability can allow an attacker to compromise containers of other tenants on the same host. Flaws in chip design can also result in the compromise of tenant information in the cloud through side-channel attacks.
Shared tenancy is a risk that is specifically associated with hosting applications in the public cloud. Public cloud providers offer shared resources to multiple customers on the same physical infrastructure. This means that multiple virtual machines and applications from different customers are running on the same physical server. While cloud providers take measures to isolate and secure these resources, there is always a risk of potential data leakage or unauthorized access if the isolation mechanisms are not robust.
Hosting applications in the public cloud means that multiple customers share the same physical infrastructure and resources provided by the cloud service provider. This shared infrastructure introduces the concept of "shared tenancy," where multiple customers' data and applications coexist on the same servers and network devices. While cloud providers implement strong security measures to isolate customer data, there is always a risk of a breach or misconfiguration that could potentially expose one customer's data to another. This risk is commonly associated with hosting applications in the public cloud.
shared tenancy model means that sensitive data, such as encryption keys, may be stored on the same physical hardware as other tenants, potentially increasing the risk of unauthorized access
C. Shared tenancy is a risk specifically associated with hosting applications in the public cloud. Public cloud environments typically host multiple tenants on the same physical hardware. While cloud providers implement security measures to ensure tenant separation and protection, the possibility of one tenant gaining unauthorized access to another tenant's data cannot be completely ruled out.
A risk that is specifically associated with hosting applications in the public cloud is shared tenancy. Shared tenancy refers to the practice of multiple customers sharing the same physical infrastructure in a cloud environment. This can create security risks, as the actions of one customer can potentially impact the security and performance of other customers on the same infrastructure. Options A, B, and D are not specifically associated with hosting applications in the public cloud, although they can be potential risks in any computing environment.
Why would it be D? How is an insider threat "specifically associated with hosting applications in the public cloud?" Insider threats are everywhere - not just in the cloud.
I didnt read the question properly and chose Unsecured Accounts, this is wrong. The correct answer is Shared Tenancy given that the clue in the question is "Public" cloud.
insider threat is also on different types of cloud, or premise location and any datacenter or LAN or WAN. dont think D is correct. keywords on the question is PUBLIC CLOUD
An insider threat is a malicious threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates, who have inside information concerning the organization's security practices, data and computer systems
upvoted 2 times
...
...
This section is not available anymore. Please use the main Exam Page.SY0-601 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
IGUESS
Highly Voted 3 years, 3 months agoslackbot
Most Recent 2 months, 2 weeks agoHuntero21
1 year, 7 months agoProtract8593
1 year, 9 months agoApplebeesWaiter1122
1 year, 9 months agoarrowphoto7604493ahmed
2 years, 1 month agoMasterControlProgram
2 years, 1 month agoDALLASCOWBOYS
2 years, 3 months agoFMMIR
2 years, 5 months agoSir_Learnalot
2 years, 6 months agoJakalan7
2 years, 7 months agoishallgetit
3 years agoBranchflake
3 years, 1 month agoDunzel
3 years, 1 month agoCLAW_
3 years, 2 months agoszl0144
3 years, 2 months agobugrovac
3 years, 3 months agoansenlool88
3 years, 2 months agogreenerme
3 years, 3 months ago