QuestionAugust 3, 2025

Which of the following is a limitation in the architecture as shown in the diagram of Q1? A The cloud server can decrypt all stored data on demand. B Data retrieval depends on the data owner's online availability. C Query tokens expose user preferences to the cloud server. D Data users can retrieve files without authorization

Which of the following is a limitation in the architecture as shown in the diagram of Q1? A The cloud server can decrypt all stored data on demand. B Data retrieval depends on the data owner's online availability. C Query tokens expose user preferences to the cloud server. D Data users can retrieve files without authorization
Which of the following is a limitation in the architecture as shown in the diagram of Q1?
A The cloud server can decrypt all stored data on demand.
B Data retrieval depends on the data owner's online availability.
C Query tokens expose user preferences to the cloud server.
D Data users can retrieve files without authorization

Solution
4.0(131 votes)

Answer

D Data users can retrieve files without authorization Explanation 1. Analyze Option A The cloud server decrypting all stored data on demand implies a security risk, but it is not necessarily a limitation of architecture unless specified in the context. 2. Analyze Option B Data retrieval depending on the data owner's online availability can be a limitation as it affects accessibility and usability. 3. Analyze Option C Query tokens exposing user preferences to the cloud server could be a privacy concern, but not directly an architectural limitation. 4. Analyze Option D Data users retrieving files without authorization indicates a security flaw, which is a significant limitation in architecture.

Explanation

1. Analyze Option A<br /> The cloud server decrypting all stored data on demand implies a security risk, but it is not necessarily a limitation of architecture unless specified in the context.<br />2. Analyze Option B<br /> Data retrieval depending on the data owner's online availability can be a limitation as it affects accessibility and usability.<br />3. Analyze Option C<br /> Query tokens exposing user preferences to the cloud server could be a privacy concern, but not directly an architectural limitation.<br />4. Analyze Option D<br /> Data users retrieving files without authorization indicates a security flaw, which is a significant limitation in architecture.
Click to rate:

Similar Questions