Deck 2 Flashcards
Cloud deployment model that alleviates the responsibility for management of the infrastructure since they are by definition hosted by a public cloud provider such as AWS, Azure, or Google Cloud. This model utilizes shared infrastructure & offers the same spare demand on a pay-as-you-need-it basis.
Private Cloud
Public Cloud
Community Cloud
Hybrid
Public Cloud
Cloud deployment model where sometimes its referred to as a data center - it resides on a company’s own infrastructure, typically firewall protected and physically secured. This cloud deployment model utilizes an organization’s own infrastructure. An organization with this cloud model still has to build and maintain all kinds of servers to meet spikes in demand across various divisions or functions.
Private Cloud
Community Cloud
Public Cloud
Hybrid
Private Cloud
This cloud deployment model is a multitenant platform that is accessible only for a specific subset of customers/allows several companies work on the same platform, given that they have similar needs and concerns.. This cloud model is for people with similar needs.
Private Cloud
Public Cloud
Community Cloud
Hybrid Cloud
Community Cloud
This cloud model refers to a mixed computing, storage, and services environment made up of a variety of cloud deployment models —that include things such as Amazon Web Services (AWS) or Microsoft Azure—with orchestration among the various platforms.
Private Cloud
Public Cloud
Community Cloud
Hybrid Cloud
Hybrid Cloud
____ is like a system restore. It gives you a restoration point.
Backup
Snapshot
Image
Snapshot
This scaling technique where you add more power (CPU, RAM) to an existing machine. “Makes a machine Bigger”
Horizontal Scaling
Vertical Scaling
Vertical scaling
This scaling technique where you add more machines into your pool of resources. This technique makes another one and/or creates new resources
Vertical Scaling
Horizontal Scaling
Horizontal Scaling
a program used to run and manage one or more virtual machines on a computer.
Hypervisor
Container
Docker
Hypervisor
What type of hypervisor is native, runs on bare metal/runs directly on the host’s hardware to control the hardware and to manage guest operating systems.
Type 1
Type 2
Type 1
What type of hypervisor runs on top of an operating system
Type 1
Type 2
Type 2
A CPU feature that allows two or more instruction threads to execute independently while sharing the same process resources. Splits an app over multiple CPU cores. Dividing up work for simultaneous processing. Instead of giving a large workload to a single core, threaded programs split the work into multiple software threads. These threads are processed in parallel by different CPU cores to save time. Executes multiple threads in a single process simultaneously.
Multithreading
VCPU
Threading
Multithreading
A process by which a CPU divides up its physical cores into virtual cores that are treated as if they are actually physical cores by the operating system. This type of threading allows multiple threads to run on each core, this means more work can be done in parallel. In this process, a single physical processor converts into two virtual processors while
Multithreading
Hyperthreading
vCPU
Hyperthreading
A computer processor that renders graphics on a virtual machine’s host server rather than on a physical endpoint device.
GPU
CPU
VGPU
VGPU (Virtual graphics processing unit)
A technology that allows the Linux kernel to directly present an internal PCI GPU to a virtual machine. The device acts as if it were directly driven by the VM, and the VM detects the PCI device as if it were physically connected.
Pass through GPU’s
GPU
CPU
Term that means to bring everything into one
Hypervisor
Hyperconverged
MultiProcessing
____refers to a geographically distributed group of network of proxy servers and their datacenters that work together to provide fast delivery of Internet content. The goal is to provide high availability and performance by distributing the service spatially relative to end users.
NGFW
CDN
DoH
CDN (Content Delivery Network)
RDP is what port
123
53
3389
3389
A network virtualization technology that attempts to alleviate the scalability problems associates with large cloud computing deployments. It is a network virtualization method that uses encapsulation and tunneling to provide subnets with large numbers of virtual LANs. This gives the virtual network to transport multiple payload types.
VXLAN
GENEVE
NVGRE
NVGRE
The maximum amount of downtime your business can tolerate without incurring a significant financial loss.
RPO
RTO
MTF
RTO
____ Refers to the point in time in the past to which you will recover. Describes a period of time in which an enterprises operations must be restored following a disruptive event.
RTP
RPO
MTTF
RPO
____ is a computer data storage architecture that manages data as objects, as opposed to other storage architectures like file systems which manages data as a file hierarchy, and block storage which manages data as blocks within sectors and tracks.
DB Storage
Object Storage
File Storage
Object Storage
Which of the following service models would be used for a database in the cloud?
PaaS
CaaS
SaaS
SaaS
A Chief information Security Officer needs to locate all of the assets with identified deviations and mitigation measures. Which of the following would help the CISO with these requirements?
An SLA Document
ADR Plan
SOC procedures
SOC procedures
A systems administrator is deploying a VM and would like to minimize storage utilization by ensuring
the VM uses only the storage if needs. Which of the following will BEST achieve this goal?
A. Compression
B. Deduplication
C. RAID
D. Thin provisioning
D. Thin provisioning
A database analyst reports it takes two hours to perform a scheduled job after onboarding 10,000
new users to the system. The analyst made no changes to the scheduled job before or after
onboarding the users. The database is hosted in an IaaS instance on a cloud provider. Which of the
following should the cloud administrator evaluate to troubleshoot the performance of the job?
A. The laaS compute configurations, the capacity trend analysis reports, and the storage IOPS
B. The hypervisor logs, the memory utilization of the hypervisor host, and the network throughput of
the hypervisor
C. The scheduled job logs for successes and failures, the time taken to execute the job, and the job
schedule
D. Migrating from laaS to on premises, the network traffic between on-premises users and the laaS
instance, and the CPU utilization of the hypervisor host
C. The scheduled job logs for successes and failures, the time taken to execute the job, and the job
schedule
A cloud administrator has deployed a new VM. The VM cannot access the Internet or the VMs on any
other subnet. The administrator runs a network command and sees the following output
IPV4 Address………………………………..172.16.31.38
Subnet Mask…………………………………255.255.255.224
Default Gateway……………………………172.16.31.254
The new VM can access another VM at 172.16.31.39. The administrator has verified the IP address is
correct. Which of the following is the MOST likely cause of the connectivity issue?
A missing static route
A duplicate IP on the network
Firewall issues
The wrong gateway
A duplicate IP on the network
A systems administrator is creating a VM and wants to ensure disk space is not allocated to the VM
until it is needed. Which of the following techniques should the administrator use to ensure?
A. Deduplication
B. Thin provisioning
C. Software-defined storage
D. iSCSI storage
B. Thin provisioning
A support engineer wants to prevent users from running malware on several IaaS compute instances.
Which of the following will BEST achieve this objective?
A. Encrypt all applications that users should not access.
B. Set the execute filesystem permissions on the desired applications only.
C. Implement an application whitelisting policy.
D. Disable file sharing on the instance.
C. Implement an application whitelisting policy.
A technician just received the lessons learned from some recent data that was lost due to an onpremises file-server crash. The action point is to change the backup strategy to minimize manual
intervention. Which of the following is the BEST approach for the technician to implement?
A. Backup as a service
B. RAID 1
C. Long-term storage
D. New backup devices
C. Long-term storage
A systems administrator is trying to reduce storage consumption. Which of the following file types
would benefit the MOST from compression?
A. System files
B. User backups
C. Relational database
D. Mail database
B. User backups