ECCouncil 312-49v11 Question Answer
During an investigation of anomalous CPU timing patterns on a compromised virtual machine hosted by a telecom provider, forensic analysts discover that the attacker launched a malicious VM on the same physical host as the target instance and extracted cryptographic keys by analyzing shared cache behavior. Which type of cloud computing attack does this technique represent?

