(2) Concepts of the Design of Infrastructure Flashcards

1
Q

What is serverless computing?

A

Serverless computing relies on whats called a Function as a Service (FaaS), which basically means that when something needs to be done, the process is completed but then the “Function Service” goes into an idle state until it is called upon again.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the advantages of serverless computing?

A

The advantages of serverless computing are reduced costs and scalability because during peak times or above peak times during rare instances, more resources can be called upon to handle the load, ensuring smooth operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is virtualization?

A

Virtualization is about running multiple computers, servers, and other computing devices on one (or a few) servers/devices. The virtualized systems act as if they are all running on their own machines but in actuality they are not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Virtual Desktop Infrastructure (VDI)?

A

VDI is used to run desktop computers in a virtual environment and then stream the live desktops to other systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What challenges do orgs have in running VDI?

A

The challenges that orgs have are that now they have to figure out how to keep an eye on, secure, and react to concerns in a virtual environment. Planning and effort are needed to make it all work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is containerization?

A

Containerization takes the concept of virtualization and applies it to individual apps.

With containerization, individual apps can be virtualized and therefore portable across OS’s and hardware platforms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does containerized software include? What are the benefits of containerization?

A

Containerized software includes the software, libraries, and other dependencies that the software needs.

Containerization results in less resource usage and portability across OS’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe how containerization is supported and how it is put into action?

What are the benefits of this setup?

A

When an organization puts containerization in place, they use a containerization platform, which standardizes the interfaces to whatever Operating System they need.

The consistent interface allows allows containers to shift between systems as they need to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What security considerations are involved with containers?

A

Containers have to be isolated from one another, especially in terms of resource utilization so that one container isn’t using the same resources as another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What security considerations need to be applied to containers?

A

Containers can’t use the same host based security tools that the underlying hardware uses, they need their own tools.

There are tools available to sign container images and to keep an eye on and to patch containers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What traditional security tools are actually applicable to containers?

A

Outside of container specific tools, hardening, application and monitoring of services and auditing style implementations are useful.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do security professionals need to remember about containerized implementations?

A

With containerized implementations, security pros need to keep in mind the host operating system and make sure it has its own security coverage.

The rapid deployment nature of containers needs to be considered and there needs to be a connected, comprehensive security mindset at all parts of the system and the software development cycle, including the OS, the software, the containers, etc.

This is to make sure each system works in harmony and no system has security vulnerabilities that could harm or jeopardize the other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly