A cloud service provider is concerned about the security risks due to velocity-of-attack.
What can the cloud service provider deploy to mitigate the impact of this attack?
A.
Containment mechanisms
B.
Role-based access control
C.
Multi-factor authentication
D.
Shredding data-at-rest
Explanation: