Which two misconfigured cloud authentication methods could leverage a cloud asset? (Choose two.)
- biometric authentication
- identity and access management (IAM) implementations
- local authentication
- federated authentication
- Intelligent Platform Management Interface (IPMI)
Explanation & Hints:
Attackers can leverage misconfigured cloud assets in several ways, including the following:
|