A _________ is a person or organization that maintains a business relationship with, and uses service from, cloud providers.
A. cloud auditor
B. cloud broker
C. cloud carrier
D. cloud consumer
D. cloud consumer
You might also like to view...
A file ____________________ is a set of characters added to the end of a file name to indicate the file's contents and origin.
Fill in the blank(s) with the appropriate word(s).
The command find / name "file?" print
a: displays the absolute pathnames such as file1, filea, fileA b: searches from the home directory c: searches from the current directory d: finds all files that have filenames such as myfile or yourfile e: all of the above
The elements of an array are accessed by their _______.
Fill in the blank(s) with the appropriate word(s).
The CIA triad is based on three characteristics of information that form the foundation for many security programs: ____.
A. confidentiality, integrity, and asset B. confidentiality, integrity, and availability C. confidentiality, information, and availability D. communication, information, and asset