Driven mainly by cost, many companies outsource computing jobs which require a large amount of processor cycles over a short duration to cloud providers. This allows the company to avoid a large investment in computing resources which will only be used for a short time.
Assuming the provisioned resources are dedicated to a single company, which of the following is the MAIN vulnerability associated with on-demand provisioning?
A . Traces of proprietary data which can remain on the virtual machine and be exploited
B . Remnants of network data from prior customers on the physical servers during a compute job
C . Exposure of proprietary data when in-transit to the cloud provider through IPSec tunnels
D . Failure of the de-provisioning mechanism resulting in excessive charges for the resources
Answer: A
Leave a Reply