Question 20:
A company that utilizes an IaaS service provider has contracted with a vendor to perform a penetration test on its environment. The vendor is able to exploit the virtualization layer and obtain access to other instances within the cloud provider`s environment that do not belong to the company. Which of the following BEST describes this attack?
Answer options:
A. VM escape B. Directory traversal C. Buffer overflow D. Heap spraying