12.2 Cloud System Management Flashcards

1
Q

_________, ________, and ________are new technologies that provide powerful solutions to some of the most difficult problems of infrastructure management.

A

Containers, infrastructure as code (IaC), and provisioners are new technologies that provide powerful solutions to some of the most difficult problems of infrastructure management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_______ can be thought of as “lightweight VMs.”

A

Containers can be thought of as “lightweight VMs.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_______ are tools that automatically configure VMs or containers for you

A

Provisioners are tools that automatically configure VMs or containers for you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Instead of manually logging into a machine and issuing commands like apt get, or editing configuration files
yourself, you can use a ______ to do this automatically.

A

provisioner

Instead of manually logging into a machine and issuing commands like apt get, or editing configuration files
yourself, you can use a provisioner to do this automatically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

____________ is the idea that the configurations for all of the VMs, containers, and networks in your deployment should be defined in text files, which you can use with provisioners to automatically recreate machines and networks whenever necessary.

A

Infrastructure as code (IaC) is the idea that the configurations for all of the VMs, containers, and networks in your deployment should be defined in text files, which you can use with provisioners to automatically recreate machines and networks whenever necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the primary benefit to IaC?

A

The primary benefit to IaC is that everyone can see exactly how the network is configured by reading text files. These can be easily version controlled with tools like Git, Apple Time Machine, or Microsoft OneDrive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

________________________ is the concept of automatically updating machines on the network whenever your IaC files change.

A

Continuous Integration/ Continuous Deployment (CI/CD) is the concept of automatically updating machines on the network whenever your IaC files change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the difference between secure configuration and secure architecture

A

SC is setting secure “rules” for individual machines and networks. Secure architecture is connecting these
individual machines and networks in safe ways.

SA can effectively mitigate the fallout of a breach.
But, the machines deployed according to that architecture must be securely configured in order for the architecture to fully deliver its security guarantees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Important cloud security concepts include ________ and _______.

A

Important cloud security concepts include fault tolerance and redundancy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False:

A fault tolerant system cannot keep running even if one or more components within the system fail.

A

False

A fault tolerant system can keep running even if one or more components within the system fail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Network Redundancy

If one system or component is lost or compromised, a redundant system or component can step in and keep the system going.

A

If one system or component is lost or compromised, a redundant system or component can step in and keep the system going.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When making decisions about network architecture, we should always consider the amount of _______ needed versus the amount of ________.

A

When making decisions about network architecture, we should always consider the amount of redundancy needed versus the amount of budget available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Placing a gateway router between VMs on a network forces all traffic through a single node. Securing and monitoring this single node is called ______.

A

Placing a gateway router between VMs on a network forces all traffic through a single node. Securing and monitoring this single node is called fanning in.

By focusing on the interactions between the routers instead of all of the machines, we only have to worry
about a few connections between a few machines, rather than connections between all machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Using a jump box, which is essentially identical to a gateway router, what are some other steps you should take to harden the system? (7)

A
  1. Limiting the number of machines that our jump box can access.
  2. Locking the root account and limiting sudo access of the admin account on the jump box.
  3. Implementing log monitoring on the jump box.
  4. Implementing two-factor authentication for SSH login to the jump box.
  5. Implementing a host firewall (UFW or IPtables) on the jump box.
  6. Limiting jump box network access with a virtual private network (VPN).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a LAMP server?

A

Linux

A web server like Apache

A database like MYSQL

A back-end codebase like PHP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You can use VMs to configure a single LAMP server by:(3)

A

Setting up a VM as a LAMP server.

Capturing an image of this VM.

Duplicating this image whenever a new LAMP server is needed.

17
Q

What does a heavy VM mean?

A

Takes a long time to download and deploy.

Additionally, if you clone an entire VM, most of the VM is “wasted space.”

Only a few files on the entire disk are actually relevant to running the LAMP server.

The rest are just operating system files.

18
Q

True or False:

Containers are essentially lightweight VMs. These act as VMs but are smaller and use fewer resources they have in common with other containers.

A

True

19
Q

What are the benefits of containers?(5)

A

Lightweight - don’t need to virtualize all computer hardware and don’t need to run their own OS.

Share resources - Containers intelligently share OS resources while remaining isolated, allowing each one to focus exclusively on its own state.

Specialized - Containers only run the software components that they need to complete their task. Containers only do one thing.

Easily duplicated - A copy or image of a container can be easily downloaded and shared from computer to computer.

Prevalent and redundant - Containers are widely used in today’s web architecture.

20
Q

True or False:

Using containers instead of VMs to run a LAMP server will immediately result in massive cost and operational savings. But, they still have to maintain their own data.

A

True

21
Q

What is the diffrence between sateful and stateless container?

A

A stateless process or application can be understood in isolation. An example of a stateless transaction would be doing a search online to answer a question you’ve thought of. You type your question into a search engine and hit enter. If your transaction is interrupted or closed accidentally, you just start a new one. Think of stateless transactions as a vending machine: a single request and a response.

Stateful applications and processes, however, are those that can be returned to again and again, like online banking or email. They’re performed with the context of previous transactions and the current transaction may be affected by what happened during previous transactions. For these reasons, stateful apps use the same servers each time they process a request from a user.

22
Q

Creating more containers to handle additional load is called ________. This is different from ________, where we simply make an existing machine more powerful by adding more RAM or CPU.

A

Creating more containers to handle additional load is called horizontal scaling. This is different from vertical scaling, where we simply make an existing machine more powerful by adding more RAM or CPU.

23
Q

True or False:

Horizontal scaling is vastly preferable to and more flexible than vertical scaling.

A

True

24
Q

What is the most common used program used to manage containers?

A

docker

25
Q

While downloading a container with Git adds a whole layer of indirection, it also eliminates _____ and ______.

A

While downloading a container with Git adds a whole layer of indirection, it also eliminates platform and version issues.

26
Q

What is Ansible?

A

A provesioning tool to ensure our proveisioning scripts run identically everywhere.

27
Q

_______ is the concept of defining all of our equipment and network with code. When using virtual machines and containers, almost every server, database, workstation, and other component in your infrastructure can be individually defined with code.

A

Infrastructure as code (IaC)

28
Q

IaC is important for keeping track of ___________. When we create code that contains the configuration of a server, that code can be version controlled and easily audited.

A

the changes we’ve made

29
Q

A provisioner is a software application used in IaC setups used to ________________.

A

A provisioner is a software application used in IaC setups used to make automated configuration changes to computers.

30
Q

True or Flse:

A

Provisioners focus on bringing a server to a certain state of operation.

31
Q

Changes made by a provisioner are created using text files, usually written in _____ or _____.

A

Changes made by a provisioner are created using text files, usually written in YAML or JSON.

32
Q

What are some common provisioners?

A

Common provisioners include Ansible, Puppet, and Chef.