which of the following low-level security methods do the cloud provider use on their storage area network and storage head-end controllers?