Point out the wrong statement.
cloud computing doesn’t have vulnerabilities associated with internet applications
Well Done.
any distributed application has a much greater attack surface than an application that is closely held on alocal area network
you can use proxy and brokerage services to separate clients from direct access to shared cloud storage
All Options are Correct