Question 46:
A company is concerned that its cloud VM is vulnerable to a cyberattack and proprietary data may be stolen. A penetration tester determines a vulnerability does exist and exploits the vulnerability by adding a fake VM instance to the IaaS component of the client`s VM. Which of the following cloud attacks did the penetration tester MOST likely implement?
Answer options:
A. Direct-to-origin B. Cross-site scripting C. Malware injection D. Credential harvesting