An important consideration when performing a remote vulnerability test of a cloud-based application is to
An important consideration when performing a remote vulnerability test of a cloud-based application is to
When performing a remote vulnerability test of a cloud-based application, it is essential to obtain the provider's permission. This ensures that the cloud provider is aware of the testing activities and can take necessary steps to prevent any disruption or blocking of the tests, as unauthorized testing might be misinterpreted as a security threat.
Without permission we cannot prform vulnerability testing
The correct answer is A. You should determine whether your provider allows customers to perform a VA of their systems. If they don't, and you do it, you may find yourself blocked, because the provider won't know the source of the scan, which could be coming from bad actors.
Wrong. I would say C
I tend to agree, since you are unable to test the underlying cloud infrastructure, and only the application can be tested