Which of these is a key component of a comprehensive cloud security strategy?
Enforcing multi-factor authentication
Storing sensitive data without encryption
Providing unrestricted access to all users
Ignoring security updates and patches

Information Technology and Cybersecurity Exercises are loading ...