Flash Cards
Who determines under what circumstances a private cloud meets the policies and needs of an organization’s strategic goals and contractual requirements (from a technical perspective)?
Cloud architect
This open source IaaS platform was developed to assist IaaS cloud providers in creating, deploying, and managing services through a single “stack” of features for the cloud environment.
Apache CloudStack
This term refers to the increasing diversity of cloud services available today as opposed to those same services being provided locally or on premise.
Anything-as-a-Service
This form of cloud storage involves the enterprise and storage service being separate, with data stored outside the confines of the enterprise environment.
Public cloud storage
This term refers to the idea of leveraging cloud computing as a way of creating offsite storage with little or no hardware requirements for the enterprise.
Online backup
The purpose of this document is to ensure appropriate security requirements and controls are applied to all U.S. federal government information and information management systems.
NIST 800-53
This form of cloud storage applies to storing mobile device data in the cloud while providing access to the stored data from anywhere.
Mobile cloud storage
This type of cloud storage involves using both public cloud and enterprise private cloud storage.
Hybrid cloud storage
This term describes software applications that help the business in solving enterprise problems.
Enterprise application
This term refers to an open source platform for cloud computing and IaaS in a private cloud environment.
Eucalyptus
This term refers to the accreditation used to distinguish between secure and well-established crypto modules produced in the private sector. It stands as a certification for those producers who need them to be used in regulated industries that typically collect, store, transfer, and share data that is deemed to be sensitive in nature but not classified.
FIPS 140-2
What is the term used when a virtual desktop infrastructure is outsourced to a third party?
Desktop as a Service
This term refers to the ability of individuals to store their data over the Internet using a storage service provider as opposed to the data being stored locally on a disk or tape backup.
Cloud backup solutions
This term describes a kind of computing model that relies on sharing compute resources in a remote location as opposed to the use of local servers or personal devices to handle computing processes.
Cloud computing
What is an organization that buys hosting services with the intent of reselling them to its own customers?
Cloud computing reseller
The testing of load and performance capabilities on the services and applications provided by cloud computing providers is designed to ensure optimal performance and scalability under varying conditions. What is it called?
Cloud testing
One type of hosting occurs when hosting services are made available on demand. As opposed to a single physical or virtual server, cloud services are set up to utilize multiple connected servers that are part of the cloud infrastructure.
Cloud server hosting
This type of database is accessible from the cloud provider on demand over the Internet to the user/customer.
Cloud database
This specification is engineered to ease the management of multiple applications, which include packaging and delivery across public and private cloud platforms.
Cloud Application Management for Platforms (CAMP)
This term refers to the processes involved with making available cloud providers, clients, and applications, resulting in the creation of a public cloud computing environment.
Cloud enablement
The term, often used in place of Platform as a Service (PaaS), describes an association with cloud computing.
Cloud OS
What is the processes involved in the transitioning of a part or all of a company’s data, applications, and services from a traditional on-premises enterprise environment to one in the cloud where information can be accessed from anywhere, anytime?
Cloud migration
The service provider that offers storage, computing, and/or software applications that are available across the Internet from anywhere, anytime.
Cloud provider
The ability for a consumer or user to be able to move their associated applications and/or data between competing cloud providers or between public and private clouds.
Cloud portability
Selecting which applications and services that will reside in the public cloud, and which will not, is the first stage in the process resulting in the deployment of a company’s cloud strategy. What is it known as?
Cloud provisioning
The person who adapts, ports, and deploys applications to a target environment.
Cloud application architect
The process of utilizing cloud management tools to ensure that cloud computing services are working properly through the use of software and technologies designed for operation and monitoring of cloud applications, data, and services.
Cloud management
A shortened phrase used to describe applications accessed via the cloud. These applications are never installed locally and are always accessed over the Internet.
Cloud apps
A type of storage whereby an organization’s data is stored in and accessible from any location of distributed and connected components of cloud computing.
Cloud storage
This person is responsible for all for the implementation, monitoring, and maintenance of the cloud environment either within the organization or on behalf of an organization as a vendor.
Cloud administrator
These individuals are tasked with development for the cloud infrastructure. Their development efforts may include client tools, solutions engagements, and system components.
Cloud developer
A third party who manages and distributes remote, cloud-based data backup services, and solutions from a central datacenter location.
Cloud backup service provider
Software that is hosted in the cloud on remote servers and performs accounting functions.
Cloud computing accounting software
One type of cloud storage wherein cloud and enterprise storage both reside inside the enterprise behind the firewall.
Private cloud storage
This enables the IT infrastructure to become more adaptive to changing business needs and requirements.
Cloud data architecture
This service offers customers the ability to rent hardware, OS, storage, and network capacity over the Internet from a cloud service provider.
Infrastructure as a Service
This form of cloud storage involves storing an individual’s data in the cloud, allowing that person access from anywhere, anytime
Personal cloud storage
A collection of distributed and connected resources used for storing and managing data online in the cloud.
Storage cloud
This model hosts software by a cloud vendor or service provider and is available to customers over network resources.
Software as a Service
These technologies describe what enables cloud computing to be a real and highly scalable service offering due to decreased costs and resource sharing across multiple tenants and environments.
Virtualization technologies
These cloud computing and services are designed for a particular vertical industry such as banking, healthcare, or some other specific-use application.
Vertical cloud computing
This term describes what happens when a customer is unable to leave, migrate, or transfer to an alternate cloud provider due to technical or nontechnical constraints.
Vendor lock-in
A model for examining the nature and severity of threats whose name is derived from and based on the following six categories: Spoofing identity, Tampering with data, Repudiation, Information disclosure, Denial of service, and Elevation of privilege.
STRIDE threat model
This term refers to a type of testing environment where untested code changes and experimentation from the production can occur safely in isolation. It is usually used in the context of software development, including web development and revision control.
Sandbox
When testing an application or software product in an operating state, we use this.
Dynamic application security testing (DAST)
This method of computer access control uses authentication factors from at least two of three categories of knowledge factors; what the user knows, what the user has, and/or what the user is.
Multifactor authentication