Question 21
Which of following is an exploit in which the attacker runs code on a VM that allows an operating system running within it to break out and interact directly with the hypervisor?
Question 22
Which one of the following is NOT one of phases for cloud auditing?
Question 23
What refers refer the model that allows customers to scale their computer and/ or storage needs with little or no intervention from or prior communication with the provider. The services happen in real time?
Question 24
Which attack surfaces, if any, does virtualization technology introduce?
Question 25
Like security and compliance. BC/DR is not a shared responsibility.