Boot Camp Reference Material Flashcards
Which of the following threat types involves an application that does not validate authorization for portions of
itself after the initial checks?
Missing function-level access control
What does the management plane typically utilize to perform administrative functions on the hypervisors that it
has access to?
APIs
Which of the following standards primarily pertains to cabling designs and setups in a data center?
Building Industry Consulting Service International (BICSI)
What is used for local, physical access to hardware within a data center?
KVM (keyboard, video, mouse) switches.
Which of the following roles is responsible for overseeing customer relationships and the processing of
financial transactions?
Cloud service business manager
Which of the following roles involves the provisioning and delivery of cloud services?
Cloud service manager
How is an object stored within an object storage system?
Key value
What are the two protocols that TLS uses?
Handshake and record
Which of the following roles is responsible for peering with other cloud services and providers?
Inter-cloud provider
The ____________ is responsible for peering with other cloud services and providers, as well as
overseeing and managing federations and federated services.
inter-cloud provider
Which of the following storage types is most closely associated with a traditional file system and tree
structure?
Volume
What must be secured on physical hardware to prevent unauthorized access to systems?
BIOS
If you’re using iSCSI in a cloud environment, what must come from an external protocol or application?
Encryption
Which of the following pertains to a macro level approach to data center design rather than the traditional
tiered approach to data centers?
International Data Center Authority (IDCA)
The standards put out by the_____________ have established the Infinity
Paradigm, which is intended to be a comprehensive data center design and operations framework. The Infinity
Paradigm shifts away from many models that rely on tiered architecture for data centers, where each
successive tier increases redundancy. Instead, it emphasizes data centers being approached at a macro level,
without a specific and isolated focus on certain aspects to achieve tier status.
International Data Center Authority (IDCA)
What is the data encapsulation used with the SOAP protocol referred to?
Envelope
Which of the following threat types involves an application developer leaving references to internal information
and configurations in code that is exposed to the client?
Insecure direct object references
What are the three components of a federated identity system transaction?
Relying party
Identity provider
User