Question 26

In which service model, cloud consumer is responsible to manage authorizations and entitlements only?
  • Question 27

    Which of the following can result in vendor lock-in?
  • Question 28

    Where does the private cloud reside?
  • Question 29

    Which of the following is not part of STRIDE model?
  • Question 30

    John's Laptop was stolen. He had saved all his passwords in a text file stored in his laptop. Adversary used the passwords from the text file and gained access to company's network and sensitive databases, of which John was the data base administrator. It resulted in theft of thousands of customer information. This incident could have been prevented by?