COMPUTER FUNDAMENTALS

EMERGING TRENDS IN COMPUTING

CLOUD COMPUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which one of the following types of risks cannot be mitigated solely with cloud-specific security technologies?
A
Identity management
B
Virtual sprawl
C
Denial-of-service attacks
D
Intellectual property protection
E
Administrative access control
Explanation: 

Detailed explanation-1: -Data loss is the most common cloud security risks of cloud computing. It is also known as data leakage.

Detailed explanation-2: -Integrity is the characteristic of not having been altered by an unauthorized party (Figure 6.2). An important issue that concerns data integrity in the cloud is whether a cloud consumer can be guaranteed that the data it transmits to a cloud service matches the data received by that cloud service.

Detailed explanation-3: -Unmanaged Attack Surface. Human Error. Misconfiguration. Data Breach. 26-Jan-2023

There is 1 question to complete.