PdfPrep.com

Which of the following is a valid NFV attack?

Which of the following is a valid NFV attack?
A . Hijack attack on hypervisor
B . DDoS attack on the SDN switches
C . Poor NFV implementation
D . Hypervisor resources leakage

Answer: A

Explanation:

Reference: https://www.etsi.org/deliver/etsi_gs/nfv-sec/001_099/001/01.01.01_60/gs_nfv-sec001v010101p.pdf

Exit mobile version