Chapter 1 Flashcards

1
Q

CASB - The cloud access security broker

A

managed identity and access management service to cloud customers that integrates security requirements across cloud services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virtualization platform

A

virtualization platforms involve the use of a host machine that actually has physical hardware. That hardware then hosts several or many virtual guest machines that run operating systems of their own.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hypervisor

A

The host machine runs special software known as a hypervisor to manage the guest virtual machines (VMs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Type1

A

In a Type 1 hypervisor, also known as a bare metal hypervisor, the hypervisor runs directly on top of the hardware and then hosts guest operating systems on top of that. This is the most common form of virtualization found in data centers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Type 2

A

In a Type 2 hypervisor, the physical machine actually runs an operating system of its own and the hypervisor runs as a program on top of that operating system. This type of virtualization is commonly used on personal computers. Common hypervisors used in this scenario are VirtualBox and Parallels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Virtualization Security

A

VM Escape/attack
VM Sprawl

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

VM Escape/Attack

A

In a virtualized environment, this may not be the case if the attacker is able to break out of the virtualized guest operating system. This type of attack is known as a VM Escape/attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

VM Sprawl

A

where there are large numbers of unused and abandoned servers on the network.
This is not only wasteful, it’s also a security risk because those servers are not being properly maintained and may accumulate serious security vulnerabilities over time if they are not properly patched.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Service Level agreements - SLAs

A

Customers should negotiate specific service levels with vendors during the contracting process and then document those service levels in written agreements called Lime Highlight created at 6:33 AM on 9/8/24service-level agreements (SLAs). SLAs specify the requirements that the vendor agrees to meet and commonly include financial penalties if the vendor fails to live up to operational obligations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Outsourcing Issues

A

Reversibility
Portability
Interoperability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Emerging Technologies

A

AI / ML
Blockchain
IoT
Containers
Quantum computing
Edge and Fog computing
Confidential computing
DevOps and DevSecOps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly