Cloud and Virtualization Flashcards

1
Q

How does a hypervisor enable multiple guest operating systems to run concurrently on a host computer?

Via a specialized driver package

By abstracting the hardware from the guest operating systems

By providing specific virtual hardware to each guest OS

A

By abstracting the hardware from the guest operating systems

The hypervisor abstracts the hardware from the guest operating system to enable multiple guest operating systems to run concurrently on a host computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Your supervisor asks you to analyze virtualization options for an upcoming project to move several critical servers onto virtual machines. He asks you to find a solution that maximizes the number of guest OSs per server and optimizes speed and efficiency. What solution should you recommend?

A Type I hypervisor, such as VMware Sphere/ESXi or Hyper-V

A Type II hypervisor, such as VirtualBox or VMware Player

Both A and B

A

A Type I hypervisor, such as VMware Sphere/ESXi or Hyper-V

Speed and efficiency are maximized by a Type I hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Your new application has multiple small processes that provide services to the network. You want to make this application run more efficiently by virtualizing it. What is the best approach for virtualization of this application?

Type II hypervisor

Linux KVM

Containerization

A

Containerization

Containerization runs small applications on a host OS with virtually no overhead

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why is VM sprawl an issue?

VM sprawl uses too many resources on parallel functions.

The more virtual machines in use, the harder it is to migrate a VM to a live server.

When servers are no longer physical, it can be difficult to locate a specific machine.

A

When servers are no longer physical, it can be difficult to locate a specific machine.

VM sprawl is an issue because when virtual machines proliferate, they can be easily moved and potentially easily copied to random locations. This can make finding a specific machine difficult without a specific organizational structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When doing incident response for your company, you are reviewing the forensics of several virtual servers and you see the attacker on the web server injecting code into uninitialized memory blocks. What attack is the attacker likely attempting?

Denial-of-service attack on the hypervisor

VM escape

Containerization attack

A

VM escape

Although all hypervisors actively try to prevent it, any flaw in memory handling could allow code that is maliciously placed in a block to be read by the hypervisor or another machine. This is known as VM escape. The scenario states virtual server, eliminating C and D, and operational code blocks in uninitialized memory would not cause DOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Your manager was just in a meeting about the security risks of storing data in the cloud and now is frantically requesting that you immediately shut off all access to cloud storage providers such as Dropbox, Box, OneDrive, and others, services that your company relies on for daily operations. What solution should you recommend to allow these services to be continued while protecting the corporate data in the cloud?

Type II hypervisor

Containerization

Encryption

A

Encryption

Data encryption can protect corporate data that is stored in cloud storage provider locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You are planning to move some applications to the cloud, including your organization’s accounting application, which is highly customized and does not scale well. Which cloud deployment model is best for this application?

SaaS

PaaS

IaaS

A

IaaS

Infrastructure as a Service is appropriate for highly customized, poorly scaling solutions that require specific resources to run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You need to move to the cloud a specific customer service module that has a web front end. This application is highly scalable and can be provided on demand. Which cloud deployment model is best for this application?

SaaS

PaaS

IaaS

A

SaaS

Software as a Service is suitable for delivering highly scalable, on-demand applications without installing endpoint software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

One of the primary resources in use at your organization is a standard database that many applications tie into. Which cloud deployment model is best for this kind of application?

SaaS

PaaS

IaaS

A

PaaS

Platform as a Service is suitable for standard resources in use by many other applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which cloud deployment model has the fewest security controls?

Private

Public

Hybrid

A

Public

The shared environment of a public cloud has the least amount of security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which cloud deployment model is shared by several organizations with a specific purpose?

Public

Hybrid

Community

A

Community

Community clouds are shared resources for a specific purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the primary downside of a private cloud model?

Restrictive access rules

Cost

Scalability

A

Cost

A private cloud model is considerably more expensive as it is a dedicated resource, negating some of the advantages of outsourcing the infrastructure in the first place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The desktop support team wants to virtualize the desktop environment on a central server. What is the advantage for adopting VDI?

Users can move to different machines and their applications will follow them.

A wide array of devices, even low-powered ones, can be used to access a user’s desktop.

No data would be compromised if the hardware was lost.

All of the above.

A

All of the above.

All of the above. Adopting VDI can provide multiple advantages, including: the session can follow the user, the desktop can be accessed from a variety of devices, and if a device is lost, it contains no corporate data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The CIO asks you to provide guidance on implementing security now that many of the corporate applications are moving to the cloud. Which of the following should you recommend implementing?

Encryption

CASBs

SaaS

A

CASBs

Cloud access security brokers (CASBs) are specialized tools or services used to protect cloud infrastructure and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the greatest advantage of outsourcing an organization’s IT security to a Security as a Service provider?

A lost or damaged encryption key can be recovered by the provider.

Security can be provided seamlessly in all geographic locations.

The provider can offer scale, cost, and speed efficiencies.

A

The provider can offer scale, cost, and speed efficiencies.

The greatest advantage to outsourcing cloud security to a Security as a Service provider is that the provider can offer scale, cost, and speed efficiencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly