Architectural Concepts Flashcards
Which of the following is not a common cloud service model? A. Software as a service (SaaS) B. Programming as a service (PaaS) C. Infrastructure as a service (IaaS) D. Platform as a service (PaaS)
B. Programming as a service is not a common offering; the others are ubiquitous throughout the industry.
All of these technologies have made cloud service viable except which? A. Virtualization B. Widely available broadband C. Encrypted connectivity D. Smart hubs
D. Virtualization allows scalable resource allocation; broadband connections allow users to have remote access from anywhere; encrypted connections allow for secure remote access. Smart hubs aren’t widely used in cloud offerings.
Cloud vendors are held to contractual obligations with specified metrics by: A. Service-level agreements (SLAs) B. Regulations C. Law D. Discipline
A. Service-level agreements (SLAs) specify objective measures that define what the cloud provider will deliver to the customer.
What drive(s) security decisions? A. Customer service responses B. Surveys C. Business requirements D. Public opinion
C. Security is usually not a profit center and is therefore beholden to business drivers; the purpose of security is to support the business.
If a cloud customer cannot get access to the cloud provider, this affects what portion of the CIA triad? A. Integrity B. Authentication C. Confidentiality D. Availability
D. Lack of access is an availability issue.
Cloud access security brokers (CASBs) might offer all the following services except:
A. Single sign-on
B. Business continuity/disaster recovery/Continuity of Operations (BC/DR/COOP)
C. Identity and access management (IAM)
D. Key escrow
B. CASBs don’t usually offer BC/DR/COOP services; that’s something offered by cloud providers.
Encryption can be used in various aspects of cloud computing, including all of these except what? A. Storage B. Remote access C. Secure sessions D. Magnetic swipe cards
D. The data on magnetic swipe cards isn’t usually encrypted.
All of these are reasons an organization may want to consider cloud migration except which? A. Reduced personnel costs B. Elimination of risks C. Reduced operational expenses D. Increased efficiency
B. Risks, in general, can be reduced but never eliminated; cloud service, specifically, does not eliminate risk to the cloud customer because the customer retains a great deal of risk after migration.
The generally accepted definition of cloud computing includes all of the following characteristics except which? A. On-demand self-service B. Negating the need for backups C. Resource pooling D. Measured or metered service
B. Backups are still just as important as ever, regardless of where your primary data and backups are stored.
A gamer is part of the PlayStation Network community cloud. Who owns the PlayStation console in the gamer’s home?
A. Sony
B. The community as a whole
C. The company that made the game that the gamer is playing at the time
D. The gamer
D. The gamer owns the console in their home. The gamer can turn it on and off at their discretion, sell it, or smash it with a hammer. The various members of a community cloud can all share the underlying resources of the community cloud as they choose. In this case, Sony, the game maker, the gamer, and the other players are all members of the community, and all share different underlying components as they choose.
11. The risk that a cloud provider might go out of business and the cloud customer might not be able to recover data is known as: A. Vendor closure B. Vendor lock-out C. Vendor lock-in D. Vending route
B. This is the definition of vendor lock-out.
12. All of these are features of cloud computing except: A. Broad network access B. Reversed charging configuration C. Rapid scaling D. On-demand self-service
B. This is a nonsense term used as a red herring.
- When a cloud customer uploads personally identifiable information (PII) to a cloud provider, who is ultimately responsible for the security of that PII?
A. Cloud provider
B. Regulators
C. Cloud customer
D. The individuals who are the subjects of the PII
C. Under current laws in most jurisdictions, the data owner is responsible for any breaches that result in unauthorized disclosure of PII; this includes breaches caused by contracted parties and outsources services. The data owner is the cloud customer.
We use which of the following to determine the critical paths, processes, and assets of an organization?
A. Business requirements
B. Business impact analysis (BIA)
C. Risk Management Framework (RMF)
D. Confidentiality, integrity, availability (CIA) triad
B. The business impact analysis is designed to ascertain the value of the organization’s assets and learn the critical paths and processes.
If an organization owns all of the hardware and infrastructure of a cloud data center that is used only by members of that organization, which cloud model would this be? A. Private B. Public C. Hybrid D. Motive
A. Because ownership and usage are restricted to only one organization, this is a private cloud.