List the security advantages of cloud-based solutions.
List the security disadvantages of cloud-based solutions.
Define and discuss the data wiping process.
Discuss how a cloud-based solution provider may reduce the risk of a DDoS attack.
Define and discuss hyperjacking attacks.
Define and discuss guest-hopping attacks.