The Increased Security Vulnerabilities challenge of cloud computing occurs when a cloud consumer organization needs to enable external communication with cloud-based IT resources. This increases vulnerabilities within the cloud consumer's organizational boundary because attackers can penetrate the on-premise environment to compromise on- premise IT resources within the cloud consumer trust boundary. This challenge does pertain to security vulnerabilities within the cloud itself. Select the correct answer.
Answer : B
Which of the following represents the cost incurred to raise required funds for new IT resource acquisitions? Select the correct answer.
Answer : B
A(n) ____________________ cloud is owned by a single organization. It enables an organization to use cloud computing technology as a means of centralizing access to IT resources by different parts of the organization. Select the correct answer.
Answer : C
Which of the following scenarios describes the Reduced Investment and Proportional Costs benefit of cloud computing? Select the correct answer.
Answer : A