8 Flashcards
A cloud deployment model consisting of two or more interlinked cloud infrastructures (private, community, or public) is referred to as a hybrid cloud.
True
Which of the following would be the best solution for a company that needs IT services but lacks any IT personnel?
** MSP **
A managed service provider (MSP) is a third-party company that remotely manages a customer’s information technology (IT) infrastructure and end-user systems
Which of the following terms refers to a third-party vendor offering IT security management services? (Select best answer)
** MSSP **
A managed security service provider (MSSP) offers network security services to an organization.
The term “Fog computing” refers to a local network infrastructure between IoT devices and the cloud designed to speed up data transmission and processing.
** True **
Fog computing is a term for technology that extends cloud computing and services to the edge of an enterprise’s network. It allows data, applications, and other resources to be moved closer to, or even on top of, end users
Which of the following solutions would be best suited for situations where response time in data processing is of critical importance?
** Edge computing **
Edge computing is a distributed computing framework that brings enterprise applications closer to data sources such as IoT devices or local edge servers. This proximity to data at its source can deliver strong business benefits, including faster insights, improved response times and better bandwidth availability.
Which of the following devices best illustrates the concept of edge computing?
Smartwatch
In client-server model, the term “Thin client” refers to a networked computer equipped with the minimum amount of hardware and software components. As opposed to thick client, which runs applications locally from its own hard drive, thin client relies on network resources provided by a remote server performing most of the data processing and storage functions.
True
Which of the following terms refers to the concept of virtualization on an application level?
Containerization
In software engineering, the term “Microservice” describes independent and self-contained code components that can be put together to form an application.
True
Which of the following answers refer to software technologies designed to simplify network infrastructure management? (Select 2 answers)
** SDV **
Software-Defined Visibility is to a visibility infrastructure what Software- Defined Networking is to a network infrastructure. SDV combines the pervasive reach of visibility with an automation framework. In an SDN infrastructure, network switches and routers form the physical network or the Layer 2-3 data plane.
*** SDN *** Software-defined networking technology is an approach to network management that enables dynamic, programmatically efficient network configuration in order to improve network performance and monitoring, in a manner more akin to cloud computing than to traditional network management.
In cloud computing, users on an on-premises network take advantage of a transit gateway to connect to:
** VPC **
A virtual private cloud (VPC) is a secure, isolated private cloud hosted within a public cloud. VPC customers can run code, store data, host websites, and do anything else they could do in an ordinary private cloud, but the private cloud is hosted remotely by a public cloud provider.
The term “VM sprawl” is used to describe a situation in which large number of deployed virtual machines lack proper administrative controls.
** True **
Virtualization sprawl is a phenomenon that occurs when the number of virtual machines (VMs) on a network reaches a point where administrators can no longer manage them effectively
The term “VM escape” refers to the process of breaking out of the boundaries of a guest operating system installation to access the primary hypervisor controlling all the virtual machines on the host machine.
** True **
Virtual machine escape is an exploit in which the attacker runs code on a VM that allows an operating system running within it to break out and interact directly with the hypervisor
Which of the following security measures can be used to prevent VM sprawl? (Select 2 answers)
Usage audit
Asset documentation
What are the countermeasures against VM escape? (Select 2 answers)
Sandboxing
Patch management