組織の内部部門は、クラウド プロバイダーを頻繁に使用して、大量の機密データを保存しています。 a. 攻撃者は、クラウド ホスト ハイパーバイザーを使用して仮想マシンを展開し、攻撃者はアクセス権をエスカレートしました。脆弱性を修復するための最善のアクションは次のうちどれですか?
正解:C
MFA can be used to reduce the likelihood that the attacker gains access to the VM, however, the scenario specifically states that the attacker was able to escalate rights and the question asks what can be done to remediate the vulnerability. the vulnerability in this case would be the ability to escalate rights. The best way to remediate the vulnerability is to update to the secure hypervisor version. A hypervisor is a software that creates and manages virtual machines on a physical server. A hypervisor can be vulnerable to various attacks, such as privilege escalation, code injection, or denial-of-service. Updating to the secure hypervisor version can help fix any known bugs or flaws in the hypervisor software and prevent attackers from exploiting them. Updating to the secure hypervisor version can also provide additional security features or enhancements that can improve the protection of the virtual machines and their data.