Question 96
Which of the following are key Data functions?
Question 97
The process which frees the resources from their physical constraints to enable pooling is called:
Question 98
Which of the below hypervisors are 0S based and are more attractive to attackers?
Question 99
Which of the following pair represents Storage used in IaaS infra-structure?
Question 100
"Resource usage can be monitored, controlled, and reported, providing transparency for both the provider and consumer of the utilized service. " Which of the following characteristics defines this?