Cloud Service A resides on Virtual Server A and Cloud Service B resides on Virtual Server B. Both virtual servers are hosted by the same physical server and the trust boundaries of Cloud Services A and B overlap. A cloud service consumer successfully uses Cloud Service A to gain access to the underlying physical server. This enables the cloud service consumer to attack Cloud Service B, which negatively affects the cloud service consumers of Cloud Service B. This is an example of which cloud security threat?
Cloud balancing cannot be achieved by redundantly deploying IT resources in advance. Redundant instances of IT resources must be dynamically generated on-demand, at runtime.
Which of the following cloud computing mechanisms can exist as a service agent that monitors and keeps track of communication between cloud service consumers and cloud services for load balancing purposes?
With cloud storage, consumers only pay for the actual storage they use.
A cloud service built as a component will have a service contract that is physically coupled to the service's logic.