Chapter 7 Cloud Management Flashcards
You are performing a security audit on a newly launched e-commerce site hosted on a private cloud. You are investigating the Internet-facing Windows servers and notice many user accounts are configured to the operations staff. what would you need to do to the unused accounts to harden the servers?
Disable the accounts.
The ability to disable an account can be helpful in situations where the account will need to be re-activated at a future date and does not need to be deleted. Account disablement can be managed in the same manner as other account operations with a web front end or with the use of APIs for scripted and automated processes.
Chapter 7 (page 234)
What authentication configuration will ignore a dictionary login attack after a set number of failed attempts?
Lockout
A lockout policy can be applied to an account that defines the parameters that create a lockout event. It is most common to apply a lockout policy to failed login attempts. For example, you can define a policy where four failed login attempts in five minutes will disable an account for thirty minutes.
Chapter 7 ( page 233)
Sophia is monitoring her cloud web server dashboard and notices that CPU utilization on her company’s database server fleet has been consistently at more than 80 percent utilization. She checked her baselines and noticed that 60 percent utilization is normal. What is the difference called?
variance
Chapter 7 (page 217)
Tom’s SQL database backend runs on a multi-CPU instance that often reaches 100 percent utilization. The database can operate on only a single server. What scalability model can he implement?
Vertical
Vertical scaling or scaling up will add resources such as CPU instances or more RAM. When you scale up, you are basically increasing your compute, network, or storage capabilities.
Chapter 7 (page 225)
Eva is the lead network architect for her company’s hybrid cloud operations, and she has interconnected her private cloud to a community cloud in another province. Eva is investigating using the community cloud to supplement her private cloud operations during end-of-month processing. What operation is she going to perform?
bursting
Cloud bursting is a hybrid model that is most commonly found in private cloud deployments that are designed to use public cloud processing during times of increased load.
This is the model where a primary data center carries the current compute load, and when additional capacity is required, a remote cloud can assist with the load. One cloud is primary and can “burst” to a backup cloud if additional capacity is required to meet a peak demand situation.
Chapter 7 (page 224)
During peak usage times, BigCo’s fleet of Internet-facing e-commerce servers often reach maximum CPU utilization. The managers like that the cloud is resilient enough to add and remove servers on demand. What type of scaling are they implementing?
horizontal
Horizontal scaling or scaling out adds more nodes instead of increasing the power of the nodes. With horizontal scaling, you will choose to add more servers to the existing configuration.
Chapter 7 (page 226)
You are explaining to a new hire at your private cloud data center about the process to follow when modifying systems and services in the cloud. What is this process called?
Change management
Change management is the process of managing all aspects of the ongoing changes, upgrades, repairs, and reconfigurations. Change management involves planning and managing changes to minimize any disruptions of service.
Chapter 7 (page 222)
What type of scaling involves an existing server with another that has more capabilities?
Vertical
Vertical scaling or scaling up will add resources such as CPU instances or more RAM. Many applications, such as databases will perform better after a system has been scaled vertically. For example, a system that is CPU bound will perform better when scaling up with additional CPU cores. The same is true with applications that benefit from more RAM or higher Local Area Network (LAN) throughput.
Chapter 7 (page 225)
Database application capacity can be added by scaling horizontally. True of false?
False
Vertical scaling or scaling up will add resources such as CPU instances or more RAM. Many applications, such as databases will perform better after a system has been scaled vertically. For example, a system that is CPU bound will perform better when scaling up with additional CPU cores. The same is true with applications that benefit from more RAM or higher Local Area Network (LAN) throughput.
Chapter 7 (page 225)
Jeff has been monitoring resource usage increases in his web server farm. Based on collected trending data, there will be regular requirements to increase the capacity of Internet web servers as usage increases and to reduce the servers during periods of low utilization. Jeff wants to use the automation capabilities of the public cloud to automatically use the orchestration of software to add servers when there is a usage spike. What is the cloud service that automates this process?
Auto-scaling
Scaling is adding capacity to your cloud deployment. To scale your cloud, you decide whether you need to scale up or scale out.
Chapter 7 (page 225)
What cloud automation feature allows for cloud services to expand and contract based on actual usage?
Elasticity
The ability to automatically and dynamically add resources such as storage, CPUs, memory, and even servers is referred to as elasticity. This done “on the fly” as needed and is different from provisioning servers with added resources that may be required in the future.
Chapter 7 (page 228)
During a change window, the server team was applying patches to an application, and the networking team was upgrading a router’s interface to 10Gbps. When the network was down, the server team complained that they could not download the needed software patches. During a post-downtime status meeting, it was determined that which process should be modified to prevent this form happening in the future?
Change management
Change management outlines policies and procedures and provides standardized process to follow, including recording the change, planning for the change, testing, documentation, approvals, evaluation and validation, instructions for backing out the change if needed, and post-change review if desired.
Chapter 7 (page 222)
A ____ is a standard of measurement that defines the conditions and the rules for performing the measurement and for understanding the results of a measurement.
Metric
Chapter 7 (page 215)
Using metrics data to trigger ____ systems, you can use thresholds to react to events at all layers of your cloud deployment.
Orchestration
Chapter 7 (page 216)
Orchestration systems are software packages or services that automate cloud security in a single package. (Chapter 5 page 140)
Once Harry has determined what is considered to be a baseline during normal web server operations, he can use that as a reference to determine what is considered to be a ____ or a system that is reporting metrics that are either above or below his expectations.
variance
Chapter 7 (page 217)
If the event is deemed to be critical, alerts can be generated by configuring a ____.
trigger
Chapter 7 (page 219)
As a general rule, the cloud providers will be responsible for the underlying ____, and if it is not defined in the ____, it will be your responsibility to maintain.
infrastructure,
SLA (service level agreement)
Chapter 7 (page 222)
____ ____ is the process of managing all aspects of the ongoing upgrades, repairs, and reconfigurations.
Change management
Change management involves planning and managing changes to minimize any disruption of service.
Change management outlines policies and procedures and provides a standardized process to follow, including recording the change, planning for the change, testing, documentation, approvals, evaluation and validation, instructions for backing out the change if needed, and post-change review if desired.
Chapter 7 (page 222)
The management of software application from the initial planning stages through to the retirement is referred to as ____ ____.
Lifecycle management
All information technology hardware and software will have a normal cycle of usefulness. This is often referred to as the application life cycle.
Chapter 7 (page 228)
Users can be granted ____ at the account level to perform a wide array of operations. The capability to manage cloud operations may allow the administrator to add, remove, or modify user accounts and the services they are allowed to access.
permissions
The capability to manage cloud operations may allow the administrator to add, remove, or modify user accounts and permissions.
User permissions can be defined at the user level or by making the user a part of a group and assigning permissions to the group.
Chapter 7 (page 234)
Enforcing password ___ may require a nondictionary word that is eight or more characters in length and contain at least one uppercase letter and a special character.
complexity
Passwords that are too short or basic or are in place for a long period of time are security risks. The IT security group will most likely be the ones that dictate the complexity of the password and its life cycle.
Chapter 7 (page 233)
All change request documents must include a detailed formal plan on the steps to be taken to implement, and if required, ____ ____ the changes.
back out
If verification fails, the same change request document must outline specifically how to back out the change and verify that it has been removed.
Chapter 7 (page (223)
Carol is collecting information on objects to monitor in her community cloud deployment. She is interested in establishing a baseline to produce a trend analysis report. What are some objects that she could natively monitor?
(Choose all that apply.)
A. Availability B. Instance initialization time C. Task runtime D. Total storage capacity E. MTBF F. None of the above G. All of the above
All of the above
All of the options given are valid metrics for establishing a baseline.
Chapter 7 ( page215)
TipoftheHat.com’s IT department wants to know what its normal day-to-day web hit count is so it can plan for the upcoming holiday selling season. Jim’s job is to measure the incoming web requests and graph them against delay and missed connection counts. What typed of data is Jim producing?
A. Metric
B. Variance
C. Baseline
D. Smoothing
Baseline
The establishment of average usage over time is the data that gets collected for a baseline report.
Baseline are used to determine what is considered to be not normal operations. You can use your baseline statistics as a reference, and if a counter has a variance above or below that value, it is considered out of variance and many need to be investigated.