Spring Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ac4s65

John, a penetration tester at a Los Angeles-based online gaming company, is analyzing the company's...

John, a penetration tester at a Los Angeles-based online gaming company, is analyzing the company's cloud infrastructure after a recent security breach caused unexpected downtime and delayed alerts. His investigation reveals that the attackers remained undetected, due to the absence of mechanisms that track function-level activity and capture anomalous events. The backend architecture for matchmaking and in-game purchases is serverless, increasing the importance of robust security measures.

So, which cloud computing threat should John prioritize to prevent similar breaches?

A.

Insufficient logging and monitoring

B.

Privilege escalation

C.

Loss of governance

D.

Side-channel attacks

312-50v13 PDF/Engine
  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions
buy now 312-50v13 pdf
Get 65% Discount on All Products, Use Coupon: "ac4s65"