CCSK Flashcards
Which technology is generally required to build resource pools?
The Internet
Virtualization
VLANs
CPUs and memory
Virtualization
What is the key difference between traditional virtualization and cloud?
Orchestration
Abstraction
Hypervisors
Commercial virtualization software
Orchestration
Which of the following is not a key potential benefit of cloud computing?
Economics
Agility
Resiliency
Compliance
Compliance
What business benefit(s) was Amazon attempting to realize when they created their internal cloud computing program? Select all that apply
Better match real-time capacity to fluctuating demand
Beat Microsoft
Build a world class public cloud computing platform
Faster time to deploy developer resources
Better match real-time capacity to fluctuating demand
Faster time to deploy developer resources
Resource pools permanently assign resources to a user.
True
False
False
Cloud computing supports scaling up of resources, but not scaling down.
True
False
False
Which of the following appear in both the NIST and ISO/IEC cloud computing definitions? Select all that appl
Self Service/rapid provisioning Self Service Resource pools On-demand Network access
Self Service/rapid provisioning Self Service Resource pools On-demand Network access
Which service model would a cloud database be considered?
Platform as a Service
Software as a Service
Infrastructure as a Service
Storage as a Service
Platform as a Service
Software as a Service is always built on top of Platform as a Service which is always built on Infrastructure as a Service.
True
False
False
Which of the following is most likely to be considered IaaS?
A container registry
The cloud’s management console
A virtual machine
A cloud message queue
A virtual machine
In IaaS, individual virtual machines use which kind of storage?
The local hard drives on the servers
A database platform
VSTOR-based hardware
Virtual volumes from a storage pool
Virtual volumes from a storage pool
Platform as a service abstracts application platforms and platform components from underlying resources, and can be built on top of IaaS.
True
False
True
Which of the following is not required to e considered SaaS?
Customer management of the underlying resources
Underlying physical hardware
A complete application
The essential characteristics
Customer management of the underlying resources
If an organization uses Community Cloud Deployment Model, some portion of the physical infrastructure MUST be on-premises with one of the community members.
True
False
False
If an organization employs the technique of cloud bursting, which cloud model are they utilizing?
Hybrid
Multi-tenancy
PaaS
Proprietary
Hybrid
Which element of the logical model describes the cloud management plane?
Infostructure
Applistructure
Infrastructure
Metastructure
Metastructure
In which service model does the cloud consumer have the least amount of control over security?
Infrastructure as a Service
Platform as a Service
Software as a Service
Security as a Service
Software as a Service
In which cloud service model is the cloud consumer responsible for ensuring that the hypervisor is not vulnerable to attack?
Infrastructure as a Service
Software as a Service
Platform as a Service
None of the above
None of the above
When should you define the security controls when building a cloud deployment?
Before determining the service and deployment models
After identifying requirements
After identifying control gaps
Before selecting the provider
After identifying control gaps
Cloud infrastructure security does not include the virtualization components.
True
False
False
Which of the following resource pools is not associated with IaaS?
Compute
Storage
Network
Middleware
Middleware
Which of the following are typically in the underlying infrastructure of a cloud? Select all that apply
Database Identity Service Message queue API Server Hypervisors
Database Identity Service Message queue API Server Hypervisors
Why is hardening infrastructure components so important?
Clouds are sometimes based on common components that may cause vulnerabilities
All security is important
Infrastructure components are most likely to be exposed to cloud customers
This prevents the cloud provider from accessing cloud consumer data
Clouds are sometimes based on common components that may cause vulnerabilities
Which of the following physical networks is used for Internet to instance traffic?
Management
Storage
Service
Virtual
Service