Question: ENISA: To mitigate credential compromise or theft, cloud provider can implement: A . Anomaly detection capabilities B . Hardening of virtual machines according to industry
ENISA: To mitigate credential compromise or theft, cloud provider
can implement:
A Anomaly detection capabilities
B Hardening of virtual machines according to industry standard
guidelines
C Portable applications using open APIs
D Dataatrest encryption
E HR background checks
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
