Cloud Operations and Compliance Flashcards

1
Q

What is a tightly coupled cluster?

A

focused on primary storage. The data is divided up and used in disk-to-disk back up systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a loosely coupled cluster?

A

It offers cost-effective building blocks that can start small and grow as applications demand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What should storage clusters be designed to do?

A

meet the required service levels
provide the ability to separate customer data in multitenant hosting environments
securely store and protect data through the use of availability, integrity, and confidentiality mechanisms, such as encryptions, hashing, masking, and multipathing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a KVM console?

A

it is an application running in the browser window for remote maintenance of a Cloud Server or virtual server cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is CIMC?

A

Cisco Integrated Management Controller is used to manage and monitor the C-Series Rack servers.

It provides options like WebGUI, CLI, and IPMI for managing and monitoring tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are VLANs?

A

it is a set of workstations within a LAN that can communicate with each other as though they were on a single, isolated LAN.

Let’s you segment a physical network so that two machines in the network can’t transmit packets back and forth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Transport Layer Security(TLS)?

A

is a cryptographic protocol designed to provide communication security over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the two layers of TLS?

A

TLS record protocol provides connection security and ensures that the connection is private and reliable.

TLS handshake protocol allows the client and server to authenticate each other and negotiate an encryption algorithm and cryptographic keys before date is sent and received.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is DNS

A

is a distributed database that contains mappings of the DNS domain names to various types of data, such as IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is DNSSEC?

A

a suite of extensions that adds security to the domain name system protocol by enabling DNS responses to be validated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the THREATs to the DNS Infrastructure?

A

Footprinting, DoS Attacks, Data modification, Redirection, and Spoofing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is DNS footprinting?

A

collecting information about DNS zone data, which includes information about key hosts in the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is active footprinting?

A

the process of using tools and techniques for performing ping sweep and traceroute commands to gather information on a target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a firewall?

A

a software or hardware-based network security system that controls the incoming and outgoing network traffic based on an applied rule set.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an IDS?

A

An intrusion detection device is passive watching of data transverse the network from monitoring ports, comparing traffic to configured rules, and setting off an alarm if it detects anything suspicious.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is NIDS?

A

Network Intrusion Detections Systems are placed at a strategic point within the network to monitor traffic to and from all devices on the network.

17
Q

What are IPSs?

A

Intrusion Prevention Systems sit inline with traffic flow on a network, actively shutting down attempted attacks as they are sent over the wire.

18
Q

What are Honeypots?

A

they are used to detect, deflect, or counteract attempts at unauthorized use of information systems.

19
Q

What is patch management?

A

the process of identifying, acquiring, installing, and verifying patches for products and systems.

20
Q

What should patches address?

A

Vulnerability detection and evaluation
Subscription mechanism to vendor patch
Severity assessment of the patch by the receiving enterprise using that software
Applicability assessment of the patch on target systems
Opening of tracking records
Customer notification of applicable patches
Change management
Successful patch application verification
Issue and risk management
Closure of tracking record

21
Q

What are some Remote Access Threats?

A

Lack of Physical Security Controls
Unsecured Networks
Infected endpoints accessing the internal network
External access to internal resources

22
Q

How do you control Remote Access Threats?

A

Tunneling via a VPN
Remote desktop protocol, which allows for desktop access to remote systems
Access via a secure terminal
Deployment of a DMZ

23
Q

How should you monitor cloud environments?

A

Network: Excessive dropped packets.
Disk: Full Disk or slow reads and writes to the disks.
Memory: Excessive memory usage or full utilization of available memory allocation.
CPU: Excessive CPU utilization.

24
Q

What is shadow IT?

A

is often defined as money spent on technology to acquire services without the IT department’s dollars or knowledge.

25
Q

What is auditing?

A

a systematic process of obtaining and evaluating evidence based on assertions about economic actions and events and establishing criteria and communicating the results to interested users.

26
Q

What is internal auditing?

A

is an independent appraisal function established within an organization to examine and evaluate its activities as a service to the organization.

27
Q

What is an IT audit?

A

Provide audit services where processes or data, or both, are embedded in technologies.

28
Q

What are fraud audits?

A

Provide investigation services where anomalies are suspected, to develop evidence to support or deny fraudulent activities.

29
Q

What is an external audit?

A

the objective is that in all material respects, financial statements are a fair representation of the organization’s transactions and account balances.

30
Q

What is the Security and Exchange Commission’s role?

A

oversees securities exchanges, securities brokers and dealers, investment advisors, and mutual funds in an effort to promote fair dealing, the disclosure of important market information, and to prevent fraud.

31
Q

What is attestation?

A

the act of witnessing the signing of a formal document and then also signing it to verify it was properly signed by those bound by its contents.

32
Q

What is an audit assertion?

A

are implicit or explicit claims and representations made by management responsible for the preparation of financial statements regarding the appropriateness of the various.

33
Q

What are the phases of auditing?

A

Planning
Obtaining Evidence
Ascertaining Reliability
Communicating Results

34
Q

What are the 4 types of opinions?

A

Unqualified
Qualified
Adverse
Disclaimer

35
Q

What is an audit risk?

A

The probability that the auditor will give an inappropriate opinion on the financial statement. The statements will contain materials misstatements that the auditor fails to find

36
Q

What is an inherent risk?

A

The probability that material misstatements have occurred.

37
Q

What is a control risk?

A

The probability that the internal controls will fail to detect material misstatements.

38
Q

What is a detection risk?

A

The probability that the audit procedures will fail to detect material statements.