Chapter 2 Cloud Deployments Flashcards
Hank is a security engineer for his publicly traded company. For secure logins, he requires users to log in with something they have and something they know. What type of authentication is this?
Multifactor
Multifactor or multilayer authentication adds an additional layer of authentication by adding token-based system in addition to the traditional username and password authentication.
Chapter 2 (page 92)
Connie is part of the cloud migration team at an insurance company. She is investigating a Windows server in the data center that runs natively on a high-end server platform. She wants to move it to an IaaS provider. What type of migration does she need to perform?
P2V
P2V (physical-to-virtual) migration means taking a server that is running an operating system and application and then migrating it to a VM running on top of a hypervisor.
Chapter 2 (page 83)
You have been brought in to assist a company’s project to move sensitive data to a public cloud. The company requires that the data be indecipherable if accessed by an unauthorized party. What general term is used to describe is operation?
Obfuscation
Obfuscation is defined as a means to complicate, confuse, or bewilder. So, obfuscating is used to hide information in stored data in the cloud.
Obfuscation is a technique used to increase the security of storage data by making it difficult to read legitimate data stored in files. Using obfuscation processes on storage systems makes it difficult for hackers or hijackers to make sense of the stored data because the data is so deeply buried (obfuscated) with random data that it is hard to determine what is actual data and what is not.
Chapter 2 (page 79)
What is the storage arrangement that divides different types of storage requirements into different offerings?
Tiering
Data can have different requirements, such as how critical it is, how often it needs to be accessed, geographical placement or encryption, and security requirements.
Different storage tiers can be defined and assigned to best meet the levels of storage the cloud customer
may require.
Chapter 2 (page 72)
Jill is the storage administrator for her company’s private cloud. She is deploying a new storage array that groups multiple disks into one logical drive. What storage technology is this?
RAID
RAID (Redundancy Array of Independent Disks), by combining physical disks, you can achieve redundancy without having to sacrifice performance. The groupings of many disks can be used to create very large volumes.
Chapter 2 (page 75)
Henry has created a volume on the cloud SAN. What type of storage is he implementing?
Block
Jacob has a critical application that requires highly durable storage. he is asking if there is a disk array technology that can withstand the simultaneous failure of two SSD drives. You are a Cloud+ consultant on the migration team. What storage technology would you recommend he implement?
RAID 6
RAID 6 is an extension of the capabilities of RAID 5. The added capability offered in the RAID 6 configuration is that a second parity setting is distributed across all the drives in the array. The advantage of adding the second parity arrangement is that RAID 6 can suffer two simultaneous hard drive failures and not lose any data.
Chapter 2 (page 78)
What is the process called when a user enters their username and password to access a cloud-based server?
Authentication
Authentication is the process of determining the identity of a client usually by a login process. By authenticating the user, you learn the identity of that user and can authorize or grant permissions to cloud resources by either allowing or denying access to specific resources.
Chapter 2 (page 81)
A private cloud deployment is worried about its first line of defense against attacks to its Internet-facing e-commerce web servers. Delbert is a security consultant. What solution should he implement?
Firewall
Firewalls are generally deployed between the cloud network and the cloud consumer for protection of unauthorized access into the networks. A firewall is either hardware based or a virtualized device that inspects network traffic and compares the traffic to the defined rules’ list to determine whether that traffic is allowed.
Chapter 2 (page 92)
What is a separate network operating in your private cloud that is accessed both internally and externally?
DMZ
Demilitarized zone (DMZ) is a section of the network that often hosts systems and servers that need to be accessed by the outside world via the Internet as well as internally. The DMZ is a special network security zone that exposes a cloud’s computers to the Internet. A DMZ will be created and configured on a firewall as a network hosting applications, such as mail, DNS, FTP, or webservers that should not be placed on the internal network but also should not be exposed directly to the Internet without security protection.
Chapter 2 (page 60)
Jonathan is asking you about a networking service he needs to make updates to. This service is used to translate human-readable names to network addresses understood by computers. What service is this?
DNS
Domain Name Service (DNS) server will have the domain name to IP address mapping and reply with the correct IP address for any given domain name. Think of this as a phonebook where you know the name of a business but not the number; the phone book provides the name-to-number lookup function.
DNS uses well-known port 53.
Chapter 2 (page 91)
Combining several companies’ user directories together for a unified cloud authentication service is called what?
Federations
Identity systems using federations allow multiple organizations to use the same data for identification when accessing the network’s or resources of everyone in the group.
Chapter 2 (page 90)
What cloud service provider document outlines assured system uptime and network performance guarantees?
Service Level Agreement
Service level agreement (SLA) is a document that outlines specific metrics an the minimum performance or availability level and outlines the penalties for failing to meet the metrics. The SLA will outline who owns the data and who owns the rights and responsibilities.
Chapter 2 (page 62)
After a user authenticates to a system, what is it called when the user is given certain rights to access services?
Authorization
When a device or user has been identified through authentication systems, then they can be given authorization to perform their specific duties.
Chapter 2 (page 89)
A hypervisor function that allows the hypervisor to reclaim unused memory from a VM running on top of the hypervisor and to allocate that memory for other uses is referred to as ___ ___.
Memory ballooning
By being able to reuse unused memory on the VMs, the hypervisor can optimize the RAM installed on the system.
Chapter 2 (page 63)
A ____ ____ ____ is very high-speed, highly redundant, and completely dedicated to interconnecting storage devices
storage area network
Storage area network (SAN)
When a server accesses storage over a SAN network, the SAN must be completely lossless and highly available. The most common dedicated store networking technology is Fibre Channel.
Chapter 2 (page 69)
____ ____ refers to a system that will remain operational even after there has been a degradation of its system.
Fault tolerance
These systems can maintain functionality because of its highly resilient design that takes into account the possibility of system failures and works to mitigate or work around any failures to maintain operations.
Chapter 2 (page 73)
____ ____ copies the data to the primary storage system and simultaneously over the network to remote sites and ensures that all replicas are up-to-date and in sync with each other.
Synchronous replication
Synchronous replication is used to support high-end transactional databases that need consistent data and instantaneous failover capabilities.
Chapter 2 (page 74)
If your cloud provider is running a different type of hypervisor, you may need to perform a ____ migration prior to moving the VMs to the new cloud service provider
V2V
Virtual-to-virtual (V2V) migrations are much more straightforward than a P2V migration. Generally, a V2V migration involves cloning the existing VM and installing that image of the cloud provider’s hosting center.
Chapter 2 (page 83)
____ ____ is the ability to move applications from one cloud provider to another without a requirement for a major format conversion.
Application portability
Application portability is the ability to move applications from one cloud providers to another without a requirement for a major format conversion. Application portability enables the customer to migrate their applications from one provider to another and avoid a situation where they are locked in a cloud vendor because of proprietary extension that make application migration difficult or impossible.
Chapter 2 (page 86)