Question 26
In which service model, cloud consumer is responsible to manage authorizations and entitlements only?
Question 27
Which of the following can result in vendor lock-in?
Question 28
Where does the private cloud reside?
Question 29
Which of the following is not part of STRIDE model?
Question 30
John's Laptop was stolen. He had saved all his passwords in a text file stored in his laptop. Adversary used the passwords from the text file and gained access to company's network and sensitive databases, of which John was the data base administrator. It resulted in theft of thousands of customer information. This incident could have been prevented by?