The ____________________ boundary represents the physical perimeter that surrounds a set of IT resources owned by a specific organization. The ___________________ boundary establishes a logical perimeter wherein IT resources are trusted from a security perspective. To use cloud-based IT resources, the cloud consumer will generally need to trust them with the result that the cloud consumer's ___________________ boundary is expanded beyond its ___________________ boundary to encompass the cloud-based IT resources. Select the correct answer.
Currently there are no comments in this discussion, be the first to comment!