Question 36

A unit of processing, which can be in a virtual machine, a container, or other abstraction and always run somewhere on a processor and consume memory is called:
  • Question 37

    Which communication methods within a cloud environment must be exposed for partners or consumers to access database information using a web application?
  • Question 38

    Cloud customer can do vulnerability assessment of their whole infrastructure on cloud just like they conduct vulnerbility assessment of their traditional infrastructure.
  • Question 39

    An incident in which sensitive, protected or confidential information is released, viewed, stolen or used by an individual who is not authorized to do so, is called:
  • Question 40

    Which of the following uses security and encryption as means to prevent unauthorized copying and limitations on distribution to only those who pay?