🔥 40% Off Crucial Exams Memberships — Deal ends today!

28 minutes, 39 seconds remaining!

Certified Ethical Hacker (CEH) Practice Question

While performing a security assessment on a serverless-only architecture, you notice that the public REST endpoint of a cloud function can be invoked without authentication. An attacker could script millions of requests, forcing the provider to spawn large numbers of short-lived instances and bill the victim for every execution. What specific threat does this scenario illustrate in serverless computing?

  • Container sandbox escape

  • Classic volumetric Denial of Service

  • Cold-start amplification

  • Denial of Wallet

Certified Ethical Hacker (CEH)
Cloud Computing
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot