Which of the following technologies is used to reinforcement cloud platform security? (Multiple Choice)
Isolate user data
Control data access
Disk I/O isolation
Protect the remaining information
Submit