The cloud service consumer sends its authentication ___________________ to the security broker. After successful authentication, the security broker responds with an authentication __________________ with which the cloud service consumer can access other cloud services. This describes how the __________________ security mechanism works.
Which of the following characteristics of cloud-based IT resources can be measured with Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) implementations?