Question 21

Which of following is an exploit in which the attacker runs code on a VM that allows an operating system running within it to break out and interact directly with the hypervisor?
  • Question 22

    Which one of the following is NOT one of phases for cloud auditing?
  • Question 23

    What refers refer the model that allows customers to scale their computer and/ or storage needs with little or no intervention from or prior communication with the provider. The services happen in real time?
  • Question 24

    Which attack surfaces, if any, does virtualization technology introduce?
  • Question 25

    Like security and compliance. BC/DR is not a shared responsibility.