Q: 8
Cloud Service A resides on Virtual Server A and Cloud Service B resides on Virtual Server B. Both
virtual servers are hosted by the same physical server and the trust boundaries of Cloud Services A
and B overlap. A cloud service consumer successfully uses Cloud Service A to gain access to the
underlying physical server. This enables the cloud service consumer to attack Cloud Service B, which
negatively affects the cloud service consumers of Cloud Service B. This is an example of which cloud
security threat?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.