Point out the correct statement.
(a) Security can be set through passwords, Kerberos tickets, or certificates
(b) Secure access to your EC2 AMIs is controlled by passwords, Kerberos, and 509 Certificates
(c) Most of the system image templates that Amazon AWS offers are based on Red Hat Linux
(d) All of the mentioned
I got this question in an interview for job.
I'd like to ask this question from Amazon Storage Systems in chapter AWS – Amazon Web Services and Microsoft Cloud Services of Cloud Computing