Domain 3 :Compare and contrast security implications of different architecture models Flashcards

1
Q

Public Cloud

A

CSP hosts multiple tenants, sometimes on the same hardware. The risk in multi-tenancy cloud models is that, since multiple organizations are hosted on the same server, the actions of one tenant can impact the actions of another, and your organization could suffer a data breach. The public cloud is known as multi-tenant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Private Cloud

A

With this model, a company may purchase its hardware or have the CSP host it on separate servers from other companies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Community Cloud

A

With this model, companies from the same industry collectively pay for a bespoke application to be written, and the cloud provider hosts it on a dedicated cloud infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hybrid Cloud

A

This model is ideal for companies that decide not to host all of their organization in the cloud. A hybrid cloud is a mixture of using both on-premises and cloud infrastructures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Infrastructure as a Service (IaaS)

A

The CSP will provide network infrastructure, including desktops, servers, storage, firewalls, routers, and switches—the hardware devices for a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Saas

A

SaaS is a cloud service in which the CSP hosts a bespoke predefined software application that is accessed through a web server. Examples of these applications include Goldmine, Salesforce, and Office 365. SaaS applications cannot be modified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Platform as a service

A

PaaS, or Platform as a Service, offers developers the necessary environment to build applications seamlessly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security as a Service (SECaaS)

A

SECaaS provides Identity and Access Management (IAM), which grants secure access to applications from anywhere at any time. A managed service security provider will provide security staff.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Anything as a Service (XaaS)

A

XaaS describes a multitude of other available cloud services, such as Network as a Service (NaaS), Desktop as a Service (DaaS), Backup as a Service (BaaS), and many more

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Infrastructure as a code

A

Infrastructure as Code (IaC) is the practice of defining and managing IT infrastructure through machine-readable code or scripts. IaC is written in languages such as YAML and JSON

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Serverless Computing

A

serverless computing offloads operational overhead, enabling developers to focus solely on writing and deploying code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Mircoservices

A

Microservices architecture involves breaking down an application into a collection of smaller, self-contained services that communicate with each other through well-defined APIs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly