EC-Council: Computer Hacking Forensic Investigator(CHFI-V10)
Module 12 : Cloud Forensics
         
Questions available : 15 You are not logged in.
Please Login for track your learning progress
   
 
Q. No: 9 | 10 | 11 | 12 | 13 | 14 | 15 |
Go to Question No.



Question No 15


If you want to share the link of this question, please click here to "Copy Question Link" and share that generated link. Link from URL may change in future.
 

   
Bookmark this Question
QID: 838  
   
In which cloud crime do attackers try to compromise the security of the cloud environment in order to steal data or inject a malware?


 
A:    Cloud as an Object
 
B:    Cloud as a Tool
C:    Cloud as an Application
 
D:    Cloud as a Subject
 
         

 
 

Diffence opinion in Correct Answer or any comment?
Vote / Comment for correct Answer



Comunity Comments:

Deepti on 24/05/2025
Opted Answer: A
When attackers target the cloud environment itself — attempting to steal data, inject malware, or exploit vulnerabilities in cloud infrastructure — the cloud is considered the object of the attack.

















WELCOME TO ONLINE EXAM PREPARATION SYSTEM

Certification Examinations