The ____________________ boundary represents the physical perimeter that surrounds a set of IT resources owned by a specific organization. The ___________________ boundary establishes a logical perimeter wherein IT resources are trusted from a security perspective. To use cloud-based IT resources, the cloud consumer will generally need to trust them with the result that the cloud consumer's ___________________ boundary is expanded beyond its ___________________ boundary to encompass the cloud-based IT resources. Select the correct answer.
A ___________________ is an event-driven program capable of transparently intercepting and processing messages sent to or from services.Select the correct answer.