Driven mainly by cost, many companies outsource computing jobs which require a large amount of
processor cycles over a short duration to cloud providers. This allows the company to avoid a
large investment in computing resources which will only be used for a short time.
Assuming the provisioned resources are dedicated to a single company, which of the following is
the MAIN vulnerability associated with on-demand provisioning?
A.
Traces of proprietary data which can remain on the virtual machine and be exploited
B.
Remnants of network data from prior customers on the physical servers during a compute job
C.
Exposure of proprietary data when in-transit to the cloud provider through IPSec tunnels
D.
Failure of the de-provisioning mechanism resulting in excessive charges for the resources