Video upload date:  · Duration: PT1H46M27S  · Language: EN

Romero, a cloud security professional, is eccouncil video

ethical-hacker video for romero, a cloud security professional, is performing security assessment on cloud services to identify any loopholes. He detects a

This is a dedicated watch page for a single video.

Full Certification Question

Romero, a cloud security professional, is performing security assessment on cloud services to identify any loopholes. He detects a vulnerability in a bare-metal cloud server that can enable hackers to implant malicious backdoors in its firmware. He also identified that an installed backdoor can persist even if the server is reallocated to new clients or businesses that use it as an IaaS. What is the type of cloud attack that can be performed by exploiting the vulnerability discussed in the above scenario?