DOMAIN 14 Related Technologies Flashcards

1
Q

Define Big Data.

A

Gartner defines it as such: “Big data is high volume, high velocity, and/or high variety information assets that require new forms of processing to enable enhanced decision making, insight discovery and process optimization.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is 3 Vs?

A

These are the core definition of Big Data:

  • • High volume: a large size of data, in terms of number of records or attributes.
  • • High velocity: fast generation and processing of data, i.e., real-time or stream data.
  • • High variety: structured, semi-structured, or unstructured data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

There are three common components of big data, regardless of the specific toolset used:

A

Distributed data collection,
Distributed storage,
Distributed processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True/False: Not all big data technologies have robust security capabilities. In some cases cloud provider security capabilities can help compensate for the big data technology limitations.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True/False: Identity and Access Management will likely occur at both cloud and big data tool levels, which can
complicate entitlement matrices.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

________ is a blanket term for non-traditional computing devices used in the physical world that utilize Internet connectivity. It includes everything from Internet-enabled operational technology (used by utilities like power and water) to fitness trackers, connected lightbulbs, medical devices, and beyond. These technologies are increasingly deployed in enterprise environments.

A

Internet of Things (IoT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does “Serverless Computing” mean?

A

Serverless computing is the extensive use of certain PaaS capabilities to such a degree that all or some of an application stack runs in a cloud provider’s environment without any customer-managed operating systems, or even containers.

“Serverless computing” is a bit of a misnomer since there is always a server running the workload someplace, but those servers and their configuration and security are completely hidden from the cloud user. The consumer only manages settings for the service, and not any of the underlying hardware and software stacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Serverless includes services such as:

A
  • • Object storage
  • • Cloud load balancers
  • • Cloud databases
  • • Machine learning
  • • Message queues
  • • Notification services
  • • Code execution environments (These are generally restricted containers where a consumer runs uploaded application code.)
  • • API gateways
  • • Web servers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True/False: Serverless places a much higher security burden on the cloud provider.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True/False: Using serverless, the cloud user will not have access to commonly-used monitoring and logging levels, such as server or network logs.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True/False: Serverless can dramatically reduce attack surface and pathways and integrating serverless
components may be an excellent way to break links in an attack chain, even if the entire application stack is not serverless.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True/False: Incident response may also be complicated and will definitely require changes in process and
tooling to manage a serverless-based incident.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True/False: Cloud users should consider use of data masking or obfuscation when considering
a service that doesn’t meet security, privacy, or compliance requirements.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True/False: Although the cloud provider is responsible for security below the serverless platform level, the cloud user is still responsible for properly configuring and using the products.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly