1.What type of providers uses various virtualization technologies to optimize the utilization of their physical IT infrastructure and to ensure an automated scale-out capability based on the performance and resource needs of the customers?
a.Service provider
b.AWS provider
c.Cloud Service
d.Both A and C
2.A log entry should contain at least the following information (if relevant):
a.A timestamp with date and current time
b.Type of event
c.Category of event
d.All of the above
3.In today’s cloud computing, a third-party cloud management broker (CMB) plays an important intermediary role between cloud computing providers and cloud users.
a.Third computing audit
b.Third-party integrity auditing
c.Public verifiability
d.Both B and C
4.Hardware/software failures and operational errors of system administrator
a.External adversaries
b.Internal adversaries
c.Byzantine failures
d.Authorized users
5.What is the name of the map is defined as e: G x G G1, where G and G1 are two multiplicative cyclic groups of the same prime order p?
a.Binary map
b.Machine learning map
c.Nonlinear map
d.Bilinear map