Chapter 1 - Architectural Concepts Flashcards

1
Q

Which of the following is not a common cloud service model?

A. Software as a Service
B. Programming as a Service
C. Infrastructure as a Service
D. Platform as a Service

A

B. Programming as a service is not a common offering; the other are ubiquitous throughout the industry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

All of these technologies have made cloud service viable except:

A. Virtualization
B. Widely available broadband
C. Cryptographic connectivity
D. Smart hubs

A

D. Virtualization allows scalable resource allocation; broadband connections allow users to have access from anywhere; cryptographic connections allow for secure remote access. Smart hubs aren’t widely used in cloud offerings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cloud vendors are held to contractual obligations with specified metrics by:

A. SLAs
B. Regulations
C. Law
D. Discipline

A

A. Service-level agreements (SLA) specify objective measures that define what the cloud provider will deliver to the customer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

_____drive security decisions.

A. Customer service responses
B. Surveys
C. Business requirements
D. Public opinion

A

C. Security is usually not a profit center, and is therefore beholden to business drivers; the purpose of security is to support its business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

If a cloud customer cannot get access to the cloud provider, this affect what CIA triad?

A. Integrity
B. Authentication
C. Confidentiality
D. Availability

A

D. Lack of access is an availability issue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cloud Access Security Brokers (CASBs) might offer all of the following services EXCEPT:

A. Single sign-on
B. BC/DR/COOP
C. IAM
D. Key escrow

A

B. CASBs don’t usually offer BC/DR/COOP services; that’s something offered by cloud providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Encryption can be used in various aspects of cloud computing, including all of these except:

A. Storage
B. Remote Access
C. Secure Session
D. Magnetic swipe cards

A

D. The data on magnetic swipe cards isn’t usually encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

All of these are reasons an organization may want to consider cloud migration except:

A. Reduced Personnel Costs
B. Elimination of risks
C. Reduced Operational Expenses
D. Increased Efficiency

A

B. Risks, in general, can be reduced but never eliminated; cloud service, specifically, does not eliminate risk to the cloud customer, because the customer retains a great deal of risk after migration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The generally accepted definition of cloud computing includes all of the following characteristics except:

A, On-demand services
B. Negating the needs for backups
C. Resource pooling
D. Measured of metered service

A

B. Backups are still just as important as ever; regardless of where your primary data and backups are stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

All of the following can result in vendor lock-in except:

A. Unfavorable Contract
B. Statutory Compliance
C. Proprietary Data Formats
D. Insufficient Bandwidth

A

B. There are no written laws that require a cloud customer to remain with a certain cloud provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The risk that a cloud provider might go out of business and the cloud customer might not be able to recover data is known as:

A. Vendor Closure
B. Vendor Lock-Out
C. Vendor Lock-In
D. Vending Route

A

B. This is the definition of vendor lock-out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

All of these are features of cloud computing except:

A. Broad Network Access
B. Reversed Charging Configuration
C. Rapid Scaling
D. On-demand Self-service

A

B. This a nonsense term used as a red herring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When a cloud customer uploads PII to a cloud provider, who becomes ultimately responsible for the security of that PII?

A. Cloud Provider
B. Regulators
C. Cloud Customer
D. The individuals who are the subjects of the PII

A

C. Under current law, the data owner is responsible for any breaches that result in unauthorized disclosure of PII; this includes breaches caused by contracted parties and outsource services. The data wonder is the cloud customer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

We use which of the following to determine the critical paths, processes, and assets of an organization?

A. Business Requirements
B. BIA
C. RMF
D. CIA Triad

A

B. The business impact analysis is designed to ascertain the value of the organization’s assets, and learn the critical paths and processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The cloud deployment model that features organizational ownership of the hardware and infrastructure, and usage only by member of that organization, is know as:

A. Private
B. Public
C. Hybrid
D. Motive

A

A. This the definition of a private cloud model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The cloud deployment model that features ownership by a cloud provider, with services offered to anyone who wants to subscribe, is know as:

A. Private
B. Public
C. Hybrid
D. Latent

A

B. This is the definition of a public cloud model.

17
Q

The cloud deployment model that features joint ownership of assets among an affinity group is known as:

A. Private
B. Public
C. Hybrid
D. Community

A

D. This is the definition of a community cloud model.

18
Q

If a cloud customer wants secure, isolated sandbox in order to conduct software development and testing, which cloud service model would probably be best?

A. IaaS
B. PaaS
C. Saas
D. Hybrid

A

B. PasS allows the cloud customer to install any kind of software, including software to be tested, on an architecture that includes and desired OSs.

19
Q

If a cloud customer wants a fully operational environment with very little maintenance or administration necessary, which cloud service model would probably be best?

A. IaaS
B. PaaS
C. Saas
D. Hybrid

A

C. SaaS is the most comprehensive cloud offering, requiring little input and administration not he part of the cloud customer.

20
Q

If a cloud customer wants a bare-bones environment in which to replicate their own enterprise for BC/DR purposes, which cloud service model would probably be best?

A. IaaS
B. PaaS
C. Saas
D. Hybrid

A

A. SaaS offers what is basically a hot/warm DR site, with hardware, connectivity, and utilities, allowing the customer to build out any kind of software configuration (including choosing OSs).

21
Q

Which entity is involved in cloud service arrangements?

A. Vendors
B. Consultants
C. Regulators
D. Investors

A

C. Regulators are involved in cloud service arrangements.