How could presence be used to enhance security in the Cloud?
Answer : C
Restricting access to systems/applications based on time is part of which Triple-A security cornerstone?
Answer : D
How can a move to Cloud Computing reduce capital expenditure?
Answer : D
What is not a security measure associated with the Single Sign On (SSO) principle?
Answer : C
What is an example of the use of location information?
Answer : C
What is a benefit of virtual client operating systems in protection against virus infections?
Answer : A
How might moving to Cloud computing enhance user's ongoing experience of software applications?
Answer : A