Point out the correct statement.
A. security can be set through passwords, kerberos tickets, or certificates
B. secure access to your ec2 amis is controlled by passwords, kerberos, and 509 certificates
C. most of the system image templates that amazon aws offers are based on red hat linux
D. all of the mentioned
Answer: Option D
Related Questions on Cloud Computing
The term 'Cloud' in cloud-computing refers to . . . . . . . .
A. The Internet
B. Cumulus Clouds
C. A Computer
D. Thin Clients
A. cloud gaming
B. experiencing multi- screens
C. image processing
D. all of the above
Join The Discussion