CCSP Flashcards

1
Q

Cloud Service Category Types

A
  • IaaS – Infrastructure as a Service
  • PaaS – Platform as a Service
  • SaaS – Software as a Service
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CSA

A
Cloud Service Auditor (CSA) 
	Operations Manager
	Deployment Manager
	Service Manager
	Business Manager
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CSB

A
Cloud Service Broker (CSB) 
	Customer Support and Care Representative
	Inter-cloud provider
	Security and Risk Manager
	Network Provider
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CSP

A

Cloud Service Provider (CSP) – Provides cloud environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CSC

A
Cloud Service Customer (CSC)
o	Service User
o	Service Administrator
o	Service business Manager
o	Service Integrator
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CSN

A

Cloud Service Partner (CSN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cloud Computing Characteristics

A
  • Broad Network Access
  • On-demand Self-service
  • Multi-tenant Capability (client data isolation)
  • Resource Pooling
  • Rapid Elasticity and Scalability
  • Measured service
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Infrastructural Building Block

A
Compute
o	Physical Hosts
o	 Virtual Machines
Network
o	Physical Transport
o	Virtual LANs – data isolation 
Storage
o	Physical Volumes
o	Shared storage pools
Services
o	Backend database structure – clusters and redundancy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SAML

A

Security Assertion Mark-up Language - used for active directory encryption (tickets)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cryptographic Erase (CE)

A

The process of knowingly erasing the media that stored encryption/decryption keys, it is effectively sanitized because there is no way to decrypt the data without the keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

802.1x

A

A security standard that supports RADIUS authentication server, VPN concentrators, Network switches, and Wireless Access Points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Rogue Virtual Machine

A

A virtual machine that’s not being controlled or managed, usually by users either knowingly or unknowingly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

VLAN Hopping

A

VLAN hopping to other VLANs, usually maliciously, as in a VLAN Hopping Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Asset Hardening

A
  • Patching
  • Disabling unnecessary software
  • Ensuring firewall/antivirus installed

for VMs, always harden the hypervisor host and guest OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hypervisor

A

A hypervisor is a virtual machine monitor (VMM) that creates and runs virtual machines. A computer on which a hypervisor runs is called a host machine, and each virtual machine is called a guest machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cloud Business Continuity (BC) considerations

A
  • Incident reporting
  • multi-location backup
  • service uptime
  • service load balancing and service response time
  • Availability of CSP Business Impact Analysis (BIA) to cloud consumers
17
Q

Clustering

A

building in backup servers for failover purposes

18
Q

Distributed services

A

Cloud applications that are compatible with all cloud environments, located in multiple databases, and available in different regions

19
Q

Vendor Lock-In

A

Customer is unable to move cloud services from one vendor to another vendor because their product or services cannot easily transition to a competitor cloud service provider.

20
Q

Persistent Storage

A

Data the resides on physical servers:

  • Block storage - always available
  • Object storage - binary storage
21
Q

Apache Cloud Stack

A

An open source cloud computing and IaaS platform developed to help make creating, deploying, and managing cloud services easier by providing a complete “stack” of features and components for cloud environments.

22
Q

Cloud App (Cloud Application)

A

The phrase used to describe a software application accessed via the Internet; may include an agent or applet installed locally on the user’s device.

23
Q

Cloud Computing

A

A type of computing, compared to grid computing, that relies on ensuring computing resources rather than having local server or personal devices to handle applications. The goal of cloud computing is to apply traditional supercomputing or high-performance computing power, normally used by military and research facilities, to perform tens of trillions of computations per second and consumer-oriented applications such as financial portfolios, or even to deliver personalized information or power immersive computer games.

24
Q

Cloud Computing Reseller

A

A company that purchases hosting services from a cloud server hosting or computing provider and then resells them to its own customers.

25
Q

Cloud Portability

A

The ability to move applications and associated data between one cloud provider and another, or between legacy and cloud environments.

26
Q

Eucalyptus

A

An open source cloud computing and Infrastructure as a Service (IaaS) platform for enabling private clouds.

27
Q

FIPS 140-2

A

A NIST document that lists accredited and outmoded cryptosystems.

28
Q

Managed Service Provider

A

An IT service where the customer dictates both the technology and operational procedures, and an external party executes administration and operational support according to a contract.

29
Q

Multi-Tenant

A

Multiple customers using the same public cloud (and often the same hosts, in a virtualized cloud environment).

30
Q

Trusted Cloud Initiative (TCI) Reference Model

A

The TCI reference model is a guide for cloud providers, allowing them to create a holistic architecture (including the physical facility of the datacenter, the logical layout of the network, and the processes necessary to utilize both) that cloud customers can purchase and use with comfort and confidence.

31
Q

Vendor Lock-out

A

Vendor lock-out occurs when a customer is unable to recover or access their own data due to the cloud provider going into bankruptcy or otherwise leaving the market.

32
Q

Virtualization

A

Creating a virtual (a logical vs. a physical) version of something, including virtual computer hardware platforms, operating systems, storage devices, and computer network resources. Computer hardware virtualization is a way of improving overall efficiency. It involves CPUs that provide support for virtualization in hardware, and other hardware components that help improve the performance of a guest environment.