What is the primary function of Data Encryption Keys (DEK) in cloud security?
Answer : B
What is resource pooling?
Answer : A
Which practice minimizes human error in long-running cloud workloads' security management?
Answer : D
How is encryption managed on multi-tenant storage?
Answer : B
How can virtual machine communications bypass network security controls?
Answer : A
Which of the following is NOT a cloud computing characteristic that impacts incidence response?
Answer : B
In a cloud environment, what does the Shared Security Responsibility Model primarily aim to define?
Answer : A