Response is D. While using cloud services, especially public clouds, users must cede direct control over a number of IT, security and privacy-related features to the CSP. Many security services and capabilities-such as security scanning, penetration testing and audits-might be prohibited by contract.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
339dfab
1 month agovsgsds
9 months, 3 weeks agoMJORGER
1 year, 5 months agoa5g
1 year, 7 months ago