ECCouncil 212-89 Question Answer
Alice is a disgruntled employee. She decided to acquire critical information from her organization for financial benefit. To acccomplish this, Alice started running a virtual machine on the same physical host as her victim's virtual machine and took advantage of shared physical resources (processor cache) to steal data (cryptographic key/plain text secrets) from the victim machine. Identify the type of attack Alice is performing in the above scenario.
ECCouncil 212-89 Summary
- Vendor: ECCouncil
- Product: 212-89
- Update on: Jul 28, 2025
- Questions: 172