Domain 1 Flashcards

1
Q

Risk reduction

A

Users can use the cloud to test ideas and concepts before making major investments in technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Scalability

A

Users have access to a large number of resources that scale based on user demand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Elasticity

A

The environment transparently manages a user’s resource utilization based on dynamically changing needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Virtualization

A

Each user has a single view of the available resources, independent of their arrangement in terms of physical devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cost

A

The pay-per-usage model allows an organization to pay only for the resources it needs with basically no investment in the physical resources available in the cloud. There are no infrastructure maintenance or upgrade costs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Mobility

A

Users can access data and applications from around the globe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Collaboration and innovation

A

Users are starting to see the cloud as a way to work simultaneously on common data and information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Anything as a service (XaaS):

A

The growing diversity of services available over the Internet via cloud computing as opposed to being provided locally or on premises.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Apache CloudStack

A

An open source cloud computing and IaaS platform developed to help make creating, deploying, and managing cloud services easier by providing a complete stack of features and components for cloud environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Business continuity

A

The capability of the organization to continue delivery of products or services at acceptable predefined levels following a loss of service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Business continuity management:

A

A holistic management process that identifies potential threats to an organization and the impacts to business operations those threats, if realized, might cause. It provides a framework for building organizational resilience with the capability of an effective response that safeguards the interests of its key stakeholders, reputation, brand, and value-creating activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Business continuity plan:

A

The creation of a strategy through the recognition of threats and risks facing a company, with an eye to ensure that personnel and assets are protected and able to function in the event of a disaster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cloud app:

A

Short for cloud application, cloud app describes a software application that is never installed on a local computer. Instead, it is accessed via the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cloud Application Management for Platforms (CAMP):

A

CAMP is a specification designed to ease management of applications—including packaging and deployment—across public and private cloud computing platforms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cloud backup:

A

Cloud backup, or cloud computer backup, refers to backing up data to a remote, cloud-based server. As a form of cloud storage, cloud backup data is stored in and accessible from multiple distributed and connected resources that comprise a cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cloud backup solutions:

A

Cloud backup solutions enable enterprises or individuals to store their data and computer files on the Internet using a storage service provider rather than storing the data locally on a physical disk, such as a hard drive or tape backup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Cloud computing:

A

A type of computing, comparable to grid computing, that relies on sharing computing resources and using a network of remote servers to store, manage, and process data instead of using a local server or a personal computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Cloud computing accounting software:

A

Cloud computing accounting software is accounting software that is hosted on remote servers. It provides accounting capabilities to businesses in a fashion similar to the SaaS business model. Data is sent into the cloud, where it is processed and returned to the user. All application functions are performed offsite, not on the user’s desktop.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Cloud database:

A

A database accessible to clients from the cloud and delivered to users on demand via the Internet. Also referred to as database as a service (DBaaS), cloud databases can use cloud computing to achieve optimized scaling, high availability, multitenancy, and effective resource allocation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Cloud enablement:

A

The process of making available one or more of the following services and infrastructures to create a public cloud computing environment: CSP, client, and application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Cloud management:

A

Software and technologies designed for operating and monitoring the applications, data, and services residing in the cloud. Cloud management tools help ensure a company’s cloud computing–based resources are working optimally and properly interacting with users and other services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Cloud migration:

A

The process of transitioning all or part of a company’s data, applications, and services from onsite premises behind the firewall to the cloud, where the information can be provided over the Internet on an on-demand basis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Cloud OS:

A

A phrase frequently used in place of PaaS to denote an association to cloud computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Cloud portability:

A

In cloud computing terminology, this refers to the ability to move applications and their associated data between one CSP and another—or between public and private cloud environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Cloud provisioning:

A

The deployment of a company’s cloud computing strategy, which typically first involves selecting which applications and services will reside in the public cloud and which will remain onsite behind the firewall or in the private cloud. Cloud provisioning also entails developing the processes for interfacing with the cloud’s applications and services as well as auditing and monitoring who accesses and utilizes the resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Cloud server hosting:

A

A type of hosting in which hosting services are made available to customers on demand via the Internet. Rather than being provided by a single server or virtual server, cloud server hosting services are provided by multiple connected servers that comprise a cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Cloud storage:

A

The storage of data online in the cloud, whereby a company’s data is stored in and accessible from multiple distributed and connected resources that comprise a cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Cloud testing:

A

Load and performance testing conducted on the applications and services provided via cloud computing—particularly the capability to access these services—to ensure optimal performance and scalability under a variety of conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Desktop as a service:

A

A form of virtual desktop infrastructure (VDI) in which the VDI is outsourced and handled by a third party. Also called hosted desktop services, desktop as a service is frequently delivered as a cloud service along with the apps needed for use on the virtual desktop.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Enterprise application:

A

Describes applications—or software—that a business uses to assist the organization in solving enterprise problems. When the word enterprise is combined with application, it usually refers to a software platform that is too large and complex for individual or small business use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Enterprise cloud backup:

A

Enterprise-grade cloud backup solutions typically add essential features such as archiving and disaster recovery (DR) to cloud backup solutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Eucalyptus:

A

An open source cloud computing and IaaS platform for enabling AWS-compatible private and hybrid clouds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Event:

A

A change of state that has significance for the management of an IT service or other configuration item. The term can also be used to mean an alert or notification created by an IT service, configuration item, or monitoring tool. Events often require IT operations staff to take actions and lead to incidents being logged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Host:

A

A device providing a service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Hybrid cloud storage:

A

A combination of public cloud storage and private cloud storage in which some critical data resides in the enterprise’s private cloud and other data is stored and accessible from a public cloud storage provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

IaaS:

A

IaaS is defined as computer infrastructure, such as virtualization, being delivered as a service. IaaS is popular in the data center where software and servers are purchased as a fully outsourced service and usually billed on usage and how much of the resource is used—compared with the traditional method of buying software and servers outright.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Incident:

A

An unplanned interruption to an IT service or reduction in the quality of an IT service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Managed service provider:

A

An IT service provider in which the customer dictates both the technology and the operational procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Mean time between failure (MTBF):

A

The measure of the average time between failures of a specific component or part of a system.

40
Q

Mean time to repair (MTTR):

A

The measure of the average time it should take to repair a failed component or part of a system.

41
Q

Mobile cloud storage:

A

A form of cloud storage that applies to storing an individual’s mobile device data in the cloud and providing the individual with access to the data from anywhere.

42
Q

Multitenant:

A

In cloud computing, multitenant is the phrase used to describe multiple customers using the same public cloud.

43
Q

Node:

A

A physical connection.

44
Q

Online backup:

A

In storage technology, online backup means to back up data from your hard drive to a remote server or computer using a network connection. Online backup technology leverages the Internet and cloud computing to create an attractive offsite storage solution with few hardware requirements for any business of any size.

45
Q

PaaS:

A

The process of deploying onto the cloud infrastructure consumer-created or acquired applications that are created using programming languages, libraries, services, and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems (OSs), or storage but has control over the deployed applications and possibly the configuration settings for the application-hosting environment.

46
Q

Personal cloud storage:

A

A form of cloud storage that applies to storing an individual’s data in the cloud and providing the individual with access to the data from anywhere. Personal cloud storage also often enables syncing and sharing stored data across multiple devices such as mobile phones and tablet computers.

47
Q

Private cloud:

A

Describes a cloud computing platform that is implemented within the corporate firewall, under the control of the IT department. A private cloud is designed to offer the same features and benefits of cloud systems but removes a number of objections to the cloud computing model, including control over enterprise and customer data, worries about security, and issues connected to regulatory compliance

48
Q

Private cloud project:

A

Companies initiate private cloud projects to enable their IT infrastructure to become more capable of quickly adapting to continually evolving business needs and requirements. Private cloud projects can also be connected to public clouds to create hybrid clouds.

49
Q

Private cloud security:

A

A private cloud implementation aims to avoid many of the objections regarding cloud computing security. Because a private cloud setup is implemented safely within the corporate firewall, it remains under the control of the IT department.

50
Q

Private cloud storage:

A

A form of cloud storage in which both the enterprise data and the cloud storage resources reside within the enterprise’s data center and behind the firewall.

51
Q

Problem:

A

The unknown cause of one or more incidents, often identified as a result of multiple similar incidents.

52
Q

Public cloud storage:

A

A form of cloud storage in which the enterprise and storage service provider are separate and the data is stored outside of the enterprise’s data center.

53
Q

Recovery point objective (RPO):

A

The RPO helps determine how much information must be recovered and restored. Another way of looking at the RPO is to ask yourself, “How much data can the company afford to lose?”

54
Q

Recovery time objective (RTO):

A

A time measure of how fast you need each system to be up and running in the event of a disaster or critical failure.

55
Q

SaaS:

A

A software delivery method that provides access to software and its functions remotely as a web-based service. SaaS allows organizations to access business functionality at a cost typically less than paying for licensed applications since SaaS pricing is based on a monthly fee.

56
Q

Storage cloud:

A

Refers to the collection of multiple distributed and connected resources responsible for storing and managing data online in the cloud.

56
Q

Vertical cloud computing:

A

Describes the optimization of cloud computing and cloud services for a particular vertical (for example, a specific industry) or specificuse application

57
Q

Virtual host

A

A software implementation of a physical host

58
Q

Cloud backup service provider:

A

A third-party entity that manages and holds operational responsibilities for cloud-based data backup services and solutions to customers from a central data center

59
Q

Cloud computing reseller:

A

A company that purchases hosting services from a cloud server hosting or cloud computing provider and then resells them to its own customers.

60
Q

Cloud customer:

A

An individual or entity that utilizes or subscribes to cloud-based services or resources

61
Q

Cloud service auditor:

A

A third-party organization that verifies attainment of service-level agreements (SLAs).

62
Q

Cloud services brokerage (CSB):

A

Typically a third-party entity or company that looks to extend or enhance value to multiple customers of cloud-based services through relationships with multiple CSPs. It acts as a liaison between cloud services customers and CSPs, selecting the best provider for each customer and monitoring the services. The CSB can be utilized as a middleman to broker the best deal and customize services to the customer’s requirements. The CSB may also resell cloud services.

63
Q

CSP:

A

A company that provides cloud-based platform, infrastructure, application, or storage services to other organizations or individuals, usually for a fee; otherwise known to clients “as a service.”

64
Q

Cloud administrator:

A

This individual is typically responsible for the implementation, monitoring, and maintenance of the cloud within the organization or on behalf of an organization (acting as a third party). Most notably, this role involves the implementation of policies, permissions, access to resources, and so on. The cloud administrator works directly with system, network, and cloud storage administrators

65
Q

Cloud application architect:

A

This person is typically responsible for adapting, porting, or deploying an application to a target cloud environment.

66
Q

Cloud architect:

A

This role determines when and how a private cloud meets the policies and needs of an organization’s strategic goals and contractual requirements from a technical perspective

67
Q

Cloud data architect:

A

This individual is similar to the cloud architect. The data architect’s role is to ensure the various storage types and mechanisms utilized within the cloud environment meet and conform to the relevant SLAs and that the storage components are functioning according to their specified requirements

68
Q

Cloud developer:

A

This person focuses on development for the cloud infrastructure itself.

69
Q

Cloud operator:

A

This individual is responsible for daily operational tasks and duties that focus on cloud maintenance and monitoring activities.

70
Q

Cloud service manager:

A

This person is typically responsible for policy design, business agreement, pricing model, and some elements of the SLA (not necessarily the legal components or amendments that require contractual amendments).

71
Q

Cloud storage administrator:

A

This role focuses on the mapping, segregations, bandwidth, and reliability of storage volumes assigned.

72
Q

Remote Key Management Service (KMS)

A

This is where the customer maintains the KMS on-premises. Ideally, the customer will own, operate, and maintain the KMS.

73
Q

Client-Side Key Management:

A

Similarly to the remote KMS approach, the client-side approach looks to put the customer or cloud user in complete control of the encryption and decryption keys.

74
Q

Type 1 hypervisor:

A

Type 1 hypervisors as those running directly on the hardware with VM (guest operating system) resources provided by the hypervisor. These are also referred to as bare metal hypervisors.

75
Q

Type 2 hypervisor:

A

Type 2 hypervisors run on a host OS to provide virtualization services. Examples of Type 2 are VMware Workstation and Virtual Box.

76
Q

Type 1 security

A

Type 1 hypervisors significantly reduce the attack surface over Type 2 hypervisors.

77
Q

Type 2 security:

A

Because Type 2 hypervisors are OS based, they are more attractive to attackers, given that there are far more vulnerabilities associated with the OS as well as other applications that reside within the OS layer

78
Q

Due diligence

A

is the act of investigating and understanding the risks a company faces

79
Q

Due care

A

is the development and implementation of policies and procedures to aid in protecting the company, its assets, and its people from threats.

80
Q

VM attacks:

A

Cloud servers contain tens of VMs. These VMs may be active or offline and, regardless of state, are susceptible to attacks. Active VMs are vulnerable to all traditional attacks that can affect physical servers

81
Q

Virtual network

A

The virtual network contains the virtual switch software that controls the movement of traffic between the virtual network interface cards (NICs) of the installed VMs and the physical NICs of the host.

82
Q

Hypervisor attacks:

A

Malicious hackers consider the hypervisor a potential target because of the greater control afforded by lower layers in the system. Compromising the hypervisor enables control over the installed VMs, the physical system, and the hosted applications

83
Q

VM-based rootkits (VMBRs)

A

These rootkits act by inserting a malicious hypervisor on the fly or modifying the installed hypervisor to gain control over the host workload.

84
Q

Virtual switch attacks:

A

The virtual switch is vulnerable to a wide range of layer II attacks such as manipulation or modification of the virtual switch’s configuration, VLANs and trust zones, and ARP tables

85
Q

DoS attacks:

A

DoS attacks in a virtual environment form a critical threat to VMs, along with all other dependent and associated services.

86
Q

Colocation:

A

Multiple VMs residing on a single server and sharing the same resources increase the attack surface and the risk of VM-to-VM or VM-tohypervisor compromise. On the other hand, when a physical server is off, it is safe from attacks. However, when a VM comes offline, it is still available as VM image files that are susceptible to malware infections and patching.

87
Q

Multitenancy:

A

By design, different users within a cloud share the same applications and the physical hardware to run their VMs. As a result, information leakage as well as an increase in the attack surface and the risk of VM-to-VM or VM-tohypervisor compromise can occur.

88
Q

Loss of control

A

Users are typically not aware of the location of their data and services, whereas the CSPs host and run VMs without being aware of their contents.

89
Q

Network topology:

A

Cloud architecture is dynamic due to the fact that existing workloads change over time because of the creation and removal of VMs. In addition, the abilities of VMs to migrate from one host to another leads to the rise of nonpredefined network topologies.

90
Q

Logical network segmentation:

A

Within IaaS, the requirement for isolation alongside the hypervisor remains a key and fundamental activity to reduce external sniffing, monitoring, and interception of communications and others within the relevant segments.

91
Q

No physical endpoints:

A

Due to server and network virtualization, the number of physical endpoints (such as switches, servers, and NICs) is reduced. These physical endpoints are traditionally used in defining, managing, and protecting IT assets

92
Q

Single point of access (SPOA) or SPOF:

A

Hosts have a limited number of access points (NICs) available to all VMs

93
Q

Key components of user access manangement

A

Intelligence:

Administration:

Authentication

Authorization

94
Q
A
95
Q

Middleware

A

software that lies between an operating system and the applications running on it. API

s