CompTIA PT0-002 Question Answer
A company is concerned that its cloud VM is vulnerable to a cyberattack and proprietary data may be stolen. A penetration tester determines a vulnerability does exist and exploits the vulnerability by adding a fake VM instance to the IaaS component of the client's VM. Which of the following cloud attacks did the penetration tester MOST likely implement?
CompTIA PT0-002 Summary
- Vendor: CompTIA
- Product: PT0-002
- Update on: Jul 17, 2025
- Questions: 464