A banking firm is considering moving some large computing jobs to a cloud provider and is considering a number of issues that come with doing so. Which of the following characteristics of cloud and virtual computing could potentially allow sensitive data to be scraped from the hardware platform?

A. elastic resource allocation
B. shared storage
C. LUN masking
D. asynchronous replication


A
Explanation: When elastic resource allocation is used, virtual resources are created and destroyed on the fly as needed , meaning at any point in time data that was "deleted" but not overwritten could be still be residing on the hardware.

Computer Science & Information Technology

You might also like to view...

A rectangular array of data is called a

(A) field. (B) record. (C) table. (D) database management system.

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. The command I places the text you enter at the beginning of the current line. 2. The vi editor default mode is the command mode. 3. Pressing the Esc key places the vi in the command mode. 4. Pressing the Esc key twice terminates the vi editor. 5. Pressing the 0 (zero) key in command mode places the cursor in the middle of the page.

Computer Science & Information Technology

Which of the following methods is the common configuration method for PCIe adapters?

A) Switches and jumpers B) Reference disk C) Plug and play D) Software disk

Computer Science & Information Technology

You have been asked to improve the quality of the code produced by the software development team, so you are creating a secure coding standard document. Which of the following is NOT a topic that should be covered?

A. error handling B. input validation C. memory use and reuse D. performance metrics

Computer Science & Information Technology