The cloud service consumer sends its authentication ___________________ to the security broker. After successful authentication, the security broker responds with an authentication __________________ with which the cloud service consumer can access other cloud services. This describes how the __________________ security mechanism works.
Which of the following provides insight information when investigating potential security breaches but does not make changes to the environment? (Select TWO).
A cloud provider grants cloud consumers administrative access to a virtual server. One of the cloud consumers deploys a cloud service consumer that abuses its administrative access to exploit the underlying physical server. This kind of attack is known as: __________________ .