Which cloud technology attack method could a threat actor use to access a user or application account that allows access to more accounts and information?
- account takeover
- metadata service attacks
- resource exhaustion and DoS attacks
- side-channel attacks
Explanation & Hint: In an account takeover attack, the threat actor gains access to a user or application account and uses it to access more accounts and information. |