EC-Council: Computer Hacking Forensic Investigator(CHFI-V10)
Module 12 : Cloud Forensics
         
Questions available : 15 You are not logged in.
Please Login for track your learning progress
   
 
Q. No: 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 |
Go to Question No.



Question No 0


If you want to share the link of this question, please click here to "Copy Question Link" and share that generated link. Link from URL may change in future.
 

   
Bookmark this Question
QID: 326  
   
An attacker has compromised a cloud environment of a company and used the employee information to perform an identity theft attack. Which type of attack is this?


 
A:    Cloud as a subject
 
B:    Cloud as a tool
C:    Cloud as an object
 
D:    Cloud as a service
 
         

 
 

Diffence opinion in Correct Answer or any comment?
Vote / Comment for correct Answer



Comunity Comments:

Deepti on 24/05/2025
Opted Answer: C
Cloud as an object: cloud environment was the target of the attack — the attacker compromised it to steal employee information, which was then used for identity theft.

Krishna on 15/05/2024
Opted Answer: B
The attacker is exploiting the cloud environment itself and using it as a tool to perform theft

Pradeep Thomas on 01/06/2024
Cloud as a Subject: refers to a crime in which the attackers attempt to compromise the security of a cloud environment to steal data or inject malware. Cloud as a tool: The cloud becomes a tool when the attacker uses a compromised cloud account to attack other accounts. In such cases, both the source and target cloud can store the evidence data (In this case, the cloud is used to plan and commit a crime)

















WELCOME TO ONLINE EXAM PREPARATION SYSTEM

Certification Examinations