Certified Ethical Hacker Practice Test
Certified Ethical Hacker Cloud Security and Penetration Testing
Which cloud service model gives the customer the most control over the underlying infrastructure?
Select your answer
A
SaaS
B
PaaS
C
IaaS
D
FaaS
Hint