Chapter 6: Securing the Cloud Flashcards

1
Q

On-premise or cloud-based security policy enforcement points.

A

Cloud Access Security Broker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Moving the execution of an application to the cloud on an as-needed basis.

A

Cloud Bursting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources.

A

Community Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Any cloud delivery model that combines two or more of the other delivery model types.

A

Hybrid Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The software that allows virtual machines to exist.

A

Hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A model of cloud computing that utilizes virtualization; clients pay an outsourcer for the resources used.

A

Infrastructure as a Structure (IaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An agency that has been involved in developing and supporting standards for the U.S. government for over 100 years.

A

National Institute of Standards and Technology (NIST)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A cloud service model wherein the consumer can deploy but does not manage or control any of the underlying cloud infrastructure.

A

Platform as a Service (PaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A cloud delivery model owned and managed internally.

A

Private Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A cloud delivery model available to others.

A

Public Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A collection of technologies that provide the ability to balance network traffic and prioritize workloads.

A

QoS (Quality of Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Isolating applications to keep users of them from venturing to other data.

A

Sandboxing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A subscription-based business model intended to be more cost effective than smaller individuals/corporations could ever achieve on their own.

A

Security as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A model of cloud computing in which the consumer can use the provider’s applications, but they do not manage or control any of the underlying cloud infrastructure.

A

Software as a Service (SaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Virtualization method that is independent of the operating system and boots before the OS.

A

Type I Hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Virtualization method that is dependent on the operating system.

A

Type II Hypervisor

17
Q

This stores everything related to the user remotely and client software locally simulates the user’s desktop environment and capabilities while running them on the host.

A

Virtual Desktop Environment (VDE)

18
Q

Encompasses the process of running a user desktop inside a virtual machine that lives on a server in the datacenter.

A

Virtual Desktop Infrastructure (VDI)

19
Q

The act of breaking out of one virtual machine into one or more others on the same host.

A

VM escape

20
Q

Growth that occurs on a large number of virtual machines and requires resources to keep up with.

A

VM sprawl