__________________ represents the ability of a cloud platform to keep track of the usage of its IT resources by cloud consumers, and is therefore directly related to the __________________ mechanism.
Select the correct answer.
Answer : B
Two redundantly deployed cloud services need to be configured so that they are kept in sync with each other. Which of the following roles would be most suitable for this task?
Select the correct answer.
Answer : C
A cloud provider grants cloud consumers administrative access to a virtual server. One of the cloud consumers deploys a cloud service consumer that abuses its administrative access to exploit the underlying physical server. This kind of attack is known as: __________________ .
Select the correct answer.
Answer : C
Cloud balancing cannot be achieved by redundantly deploying IT resources in advance. Redundant instances of IT resources must be dynamically generated on-demand, at runtime.
Select the correct answer.
Answer : B
A ____________________ is a pre-defined cloud-based platform comprised of a set of already installed IT resources that can be used and customized by a cloud consumer.
Select the correct answer.
Answer : C
A malicious cloud service consumer circumvents the authentication enforced by the virtual server and manages to attack the underlying hardware directly. This is an example of which cloud security threat? Select the correct answer.
Answer : D
Messages being sent from a cloud service consumer to a cloud service are intercepted and maliciously altered by an intermediary service. This is an example of which cloud security threat?
Select the correct answer.
Answer : D