The _________________________mechanism supplies cloud consumers with the tools and permission
management options for administering resource pools.
The _____________________threat arises when messages are intercepted and altered by a malicious
service agent, thereby potentially compromising the message’s confidentiality and/or integrity.
The ____________________ architecture establishes a sophisticated failover system that allows virtual