Which of the following is one way to mitigate the issue of non-secure communication
methods used by cloud providers?
A.
Insist that the provider use authentication to connect to the non-secure applications.
B.
Insist that the provider place firewalls and routers at the border of the cloud environment.
C.
Insist that the provider switch to secure protocols, such as SSH instead of Telnet.
D.
Insist that the provider implement username/password on all protocols.