Which component of cloud security uses automated testing with static application security testing (SAST) to identify potential threats?
At which layer of the OSI model are routing protocols defined?
Which type of attack involves sending data packets disguised as queries to a remote server, which then sends the data back to the attacker?
In which two cloud computing service models are the vendors responsible for vulnerability and patch management of the underlying operating system? (Choose two.)