2.2 Summarize virtualization and cloud computing concepts Flashcards

1
Q

Performing processing and storage elsewhere, over a network connection, rather than locally. Thought of as internet based computing.

A

Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cloud deployment models

A
IaaS
PaaS
SaaS
XaaS
Public
Community
Hybrid
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The idea of using storage capacity provided by a cloud vendor as a means to host data files for an organization. Can be used as a form of backup or support for online data services.

A

Cloud storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A cloud provider concept in which security is provided to an organization through or by an online entity.

A

SECaaS (Security as a service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cloud service providers (CSPs) are the companies that operate a cloud service.

A

Cloud Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Managed service provider (MSP) and managed security service provider (MSSP) are services that provide remote oversight and management of on-premises IT or cloud IT.

A

Manage security service provider (MSP/MSSP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Computing that relies upon sensors, IoT devices, or even edge computing devices to collect data and then transfer it back to a central location for processing.

A

Fog computing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In edge computing, the intelligence and processing are contained within each device. The architecture of edge computing performs computations closer to the data source, which is at or near the edge of the network.

A

Edge computing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A thin client is a computer with low to modest capability or a virtual interface that is used to remotely access and control a mainframe, virtual machine, or virtual desktop infrastructure (VDI).

A

Understand thin client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Application cells or application containers are used to virtualize software so they can be ported to almost any OS.

A

Understand application cells/containers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Microservices are an emerging feature of web-based solutions and is a derivative of service-oriented architecture (SOA). SOA constructs new applications or functions out of existing but separate and distinct software services.

A

Understand Microservices./ API

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Infrastructure as code is a change in how hardware management is perceived and handled. Instead of seeing hardware configuration as a manual, direct, hands-on, one-on-one administration hassle, it is viewed as just another collection of elements to be managed in the same way that software and code are managed under DevOps.

(Page 151).

A

Understand infrastructure as code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Software-defined networking (SDN) is a unique approach to network operation, design, and management. SDN aims at separating the infrastructure layer (hardware and hardware-based settings) from the control layer (network services of data transmission management).

A

Understand SDN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Software-defined visibility (SDV) is a framework to automate the processes of network monitoring and response. The goal is to enable the analysis of every packet and make deep intelligence-based decisions on forwarding, dropping, or otherwise responding to threats.

A

Understand SDV.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Serverless architecture is a cloud computing concept where code is managed by the customer and the platform (i.e., supporting hardware and software) or server is managed by the CSP.

A

Serverless architecture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Services integration, cloud integration, systems integration, and integration platform as a service (iPaas) is the design and architecture of an IT/IS solution that stiches together elements from on-premises and cloud sources into a seamless productive environment.
.

A

Services integration.

17
Q

Resource policies are used to manage the use of cloud resources, which in turn reduces wasted spending on unnecessary cloud costs. Resource policies can define what resources are provisioned, where that takes place, and who is able to trigger and use those resources.

A

Resource policies.

18
Q

A transit gateway establishes a simple and seamless integration of virtual private clouds (VPCs) and local systems through a central hub or cloud router.

A

Transit gateway.

19
Q

Virtualization technology is used to host one or more OSs within the memory of a single host computer. Related issues include snapshots, patch compatibility, host availability/elasticity, security control testing, and sandboxing.

A

Virtualization.

20
Q

The hypervisor, also known as the virtual machine monitor (VMM), is the component of virtualization that creates, manages, and operates the virtual machines.

A

Understand hypervisors. (VM)

21
Q

A type I hypervisor is a native or bare-metal hypervisor. In this configuration, there is no host OS; instead, the hypervisor installs directly onto the hardware where the host OS would normally reside.

A

Type I hypervisor.

22
Q

A type II hypervisor is a hosted hypervisor. In this configuration, a standard regular OS is present on the hardware, and the hypervisor is then installed as another software application.

(Page 152).

A

Type II hypervisor.

23
Q

VM sprawl occurs when an organization deploys numerous virtual machines without an overarching IT management or security plan in place. To prevent or avoid VM sprawl, a policy must be established and enforced regarding the procedure for developing and deploying VMs.

A

Comprehend VM sprawl avoidance.

24
Q

VM escaping occurs when software within a guest OS is able to breach the isolation protection provided by the hypervisor to violate the container of other guest OSs or to infiltrate a host OS.

A

Understand VM escaping.