Point out the correct statement:
a) Security can be provided by setting up passwords, Kerberos tickets, or certificates
b) Secure access to your EC2 AMIs is controlled by passwords, Kerberos, and 509 Certificates
c) Most of the system image templates that Amazon AWS offers are based on Red Hat Linux
d) All of the mentioned