Hypervisors and Cloud Flashcards
cloud
What is Data remanence?
the residual representation of digital data that remains even after attempts have been made to remove or erase it.
cloud
What is the security concern regarding Data remanence?
If the data was not properly erased from the underlying storage, it could be exposed to the other organization.
cloud
How do you protect your cloud environment from Data remanence?
All cloud-based storage drives should be encrypted by default to prevent data remanence from being read by others.
cloud
What is meant by the term Metered Services?
Metered services are pre-paid, a-la-carte, pay-per-use, or committed offerings. A metered service like a database may charge its users based on the actual usage of the service resources on an hourly or monthly basis.
cloud
What is meant by the term Resource pooling?
Resource pooling refers to the concept that allows a virtual environment to allocate memory and processing capacity for a VMs use.
cloud
What is meant by On-demand in cloud services?
On-demand refers to the fact that a consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service provider.
cloud
What steps must be taken when setting up new thin client computers to allow access to a VDI (virtual desktop infrastructure) environment.
- Connect the thin client to the network.
- Install the latest security updates.
- Install the necessary applications.
Cloud Security
Proper data disposal and management practices are crucial to mitigate the risk of data breaches caused by data remnants. Which cloud service would be most associated with this as a security concern? When will data remnants possibly remain on pre-utilized cloud infrastructure?
The security concern related to data remnants and potential data breaches in the context of using a cloud service provider would most likely be associated with “On-Demand” services.
When you provision resources on-demand in a cloud environment, there’s a risk that data remnants—pieces of data left behind after the resources are released or deleted—may still persist within the cloud infrastructure. If not properly managed or disposed of, these remnants could potentially be accessed by unauthorized parties, leading to a data breach.
when utilizing on-demand cloud services.
virtual machines
This is a Type 2 hypervisor that allows you to install the software inside your existing operating system.
Virtual Box is a Type 2 Hypervisor
that can run on macOS
Virtual Machines
These are 3 Type-1bare-metal hypervisors
VMware ESXi
Hyper-V
RHEV
Hyper-visors
This hypervisor type runs directly on hardware.
Type 1 Hypervisor
Hyper-visors
This hypervisor type runs on
top of an operating system
Type 2
Hyper-visors
Virtual Box is which type of hypervisor?
Type 2 - runs on top of an OS.
Hyper-visors
VMware ESXi is this type of hypervisor.
Type 1 - Bare Metal
hyper-visors
Hyper-V is this type of hypervisor.
Type 1 - Bare-metal hypervisor