• Post author:
  • Post category:Blog
  • Reading time:1 mins read
  • Post last modified:June 12, 2024

Which two misconfigured cloud authentication methods could leverage a cloud asset? (Choose two.)

  • biometric authentication
  • identity and access management (IAM) implementations
  • local authentication
  • federated authentication
  • Intelligent Platform Management Interface (IPMI)
Explanation & Hints:

Attackers can leverage misconfigured cloud assets in several ways, including the following:

  • Misconfigured identity and access management (IAM) implementations
  • Federation misconfigurations

For more Questions and Answers:

Ethical Hacker Course Final Exam Answers Full 100%

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments