Answered step by step
Verified Expert Solution
Question
1 Approved Answer
A user creates an Ubuntu Linux virtual machine in Virtual Box on a Windows 1 0 physical host. Virtual box is configured so that the
A user creates an Ubuntu Linux virtual machine in Virtual Box on a Windows physical host. Virtual box is configured so that the virtual machine only has access to the files on its own virtual disk. Two weeks later, the user is using a web browser on the virtual machine. The virtual machine becomes infected with malware the user unknowingly acquires from a website. Assume, the perpetrator of the malware can now access and modify at will any file on the physical hard drive of the Windows host. In terms of CVSS which of these is now true?
A user creates an Ubuntu Linux virtual machine in Virtual Box on a Windows physical host. Virtual box is configured so that the virtual machine only has access to the files on its own virtual disk. Two weeks later, the user is using a web browser on the virtual machine. The virtual machine becomes infected with malware the user unknowingly acquires from a website. Assume, the perpetrator of the malware can now access and modify at will any file on the physical hard drive of the Windows host. In terms of CVSS which of these is now true?
The Attack Vector is physical.
The Integrity Impact is low.
The Scope has changed.
Confidentiality Impact is low.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started