1 What is the cloud computing reference architecture?
2 Describe some of the main cloud-specific security threats.
3 What are the advantages of each of the three approaches shown in Figure 17.1?
4 What protocols comprise SSL?
5 What is the difference between an SSL connection and an SSL session?
1 List and briefly define four EAP authentication methods.
2 What is EAPOL?
3 What is the function of IEEE 802.1X?
4 Define cloud computing.
5 List and briefly define three cloud service models.