EC-Council: Computer Hacking Forensic Investigator(CHFI-V10)
Module 12 : Cloud Forensics
         
Questions available : 15 You are not logged in.
Please Login for track your learning progress
   
 
Q. No: 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 |
Go to Question No.



Question No 0


If you want to share the link of this question, please click here to "Copy Question Link" and share that generated link. Link from URL may change in future.
 

   
Bookmark this Question
QID: 423  
   
In which attack does an attacker place a virtual machine (VM) in proximity to a target cloud server, and take advantage of shared physical resources (processor cache) to extract cryptographic keys/plain text secrets to steal the victim‘s credentials?


 
A:    Spoofing Attack
 
B:    Cloud Hijacking Attack
C:    Wrapping Attack
 
D:    Side Channel Attacks
 
         

 
 

Diffence opinion in Correct Answer or any comment?
Vote / Comment for correct Answer




















WELCOME TO ONLINE EXAM PREPARATION SYSTEM

Certification Examinations