In which two cloud computing service models are the vendors responsible for vulnerability and patchmanagement of the underlying operating system? (Choose two.)
In which phase of the cyberattack lifecycle do attackers establish encrypted communication channels back toservers across the internet so that they can modify their attack objectives and methods?