which of the following is the MAIN vulnerability associated with on-demand provisioning?

Driven mainly by cost, many companies outsource computing jobs which require a large amount of
processor cycles over a short duration to cloud providers. This allows the company to avoid a
large investment in computing resources which will only be used for a short time.
Assuming the provisioned resources are dedicated to a single company, which of the following is
the MAIN vulnerability associated with on-demand provisioning?

Driven mainly by cost, many companies outsource computing jobs which require a large amount of
processor cycles over a short duration to cloud providers. This allows the company to avoid a
large investment in computing resources which will only be used for a short time.
Assuming the provisioned resources are dedicated to a single company, which of the following is
the MAIN vulnerability associated with on-demand provisioning?

A.
Traces of proprietary data which can remain on the virtual machine and be exploited

B.
Remnants of network data from prior customers on the physical servers during a compute job

C.
Exposure of proprietary data when in-transit to the cloud provider through IPSec tunnels

D.
Failure of the de-provisioning mechanism resulting in excessive charges for the resources



Leave a Reply 0

Your email address will not be published. Required fields are marked *