What occurs during a Shared Technology Vulnerability threat?
A.
An attacker gains access to an administrator's, user's or system account.
B.
An attacker avoids applications that are already approved by an IT organization.
C.
An attacker exploits the weaknesses of tools used to enable multi-tenancy.
D.
An attacker exhausts network bandwidth or CPU cycles.
The Answer Is:
C
This question includes an explanation.
Explanation:
During a Shared Technology Vulnerability threat, an attacker exploits the weaknesses of tools used to enable multi-tenancy. Multi-tenancy allows multiple customers to share the same applications or physical infrastructure while keeping their data isolated. However, if there are vulnerabilities in the tools that support this shared environment, attackers can exploit these weaknesses to gain unauthorized access to data or disrupt services.
References:
Dell EMC Information Storage and Management (ISM) v5, Security and Risk Management Module, particularly the discussion on multi-tenancy and shared technology vulnerabilities.
D-ISM-FN-23 PDF/Engine
Printable Format
Value of Money
100% Pass Assurance
Verified Answers
Researched by Industry Experts
Based on Real Exams Scenarios
100% Real Questions
Get 65% Discount on All Products,
Use Coupon: "ac4s65"