🔥 40% Off Crucial Exams Memberships — Deal ends today!

1 hour, 0 minute remaining!

Certified Ethical Hacker (CEH) Practice Question

During a black-box assessment of a SaaS provider that hosts its web front-end on Amazon EC2, you observe an image-fetching feature that lets users supply an arbitrary URL. By pointing the parameter to http://169.254.169.254/latest/meta-data/iam/security-credentials/AppRole, the application responds with an AccessKeyId, SecretAccessKey, and SessionToken. Which statement best explains why this exposure represents a critical cloud-centric threat?

  • It only discloses the instance's kernel version, which could help local privilege escalation but poses no wider cloud risk.

  • Responses from the metadata service are restricted to the calling virtual machine and cannot be reused externally, limiting the impact to denial-of-service.

  • IMDSv1 requires a valid X-aws-ec2-metadata-token header for any request, so the exploit would fail outside the instance itself.

  • The metadata service reveals short-lived AWS keys that can be used through the AWS API with every permission granted to the instance role, enabling an attacker to pivot into other cloud resources.

Certified Ethical Hacker (CEH)
Cloud Computing
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot