MOD 19 - Cloud Computing Flashcards

1
Q

Cloud computing service models

A

Search your Bookshelf book for “types of cloud computing services”, then know what the 7 listed service models are
IaaS, PaaS, SaaS, IDaaS, SECaaS, CaaS, FaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cloud deployment models

A

Public, Private, Community, Hybrid, Multi-cloud (multiple providers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NIST Cloud Deployment Ref. Arch.

A

Cloud Consumer, Provider, Carrier, Auditor, Broker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • Zero Trust networks
A

Network architecture where every incoming connection and transaction must be verified first. Never trust a connection based on location or IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • Vendor Lock-in
A

Vendor lock in is when the cost of breaking your contract or switching to another provider is cost-prohibitive and you’re stuck with the original vendor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Containers & Architecture

A

Review the 5 tiers of Container Technology Architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Docker

A

Docker is a set of platform as a service products that use OS-level virtualization to deliver software in packages called containers. Containers are isolated from one another and bundle their own software, libraries and configuration files. The Docker daemon (dockerd), listens for Docker API requests and manages Docker objects like images, containers, networks, and volumes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

*Kubernetes

A

Kubernetes is Google’s orchestration platform for managing containers and microservices.
The Kube-scheduler is the component scans new pods (groups of containers) and assigns computers/nodes to them to run the pods/containers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cloud Hopper attack

A

Triggered at the MSP (Managed Service Provider) and their customers. Attacker uses spear-phishing e-mails with custom-made malware to compromise the accounts of staff or cloud service firms to obtain confidential info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

*Cloudborne attack

A

Targets a bare-metal cloud server to implant a malicious backdoor in its firmware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Tier Technology of Containers

A

Know Tier 1, 2, 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Tier 2

A

Sign, Approve, send to registry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DockerD

A

Processes the API requests handles various docker objects, such as containers, volumes, images, and networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

OWASP Top 10 Cloud Security Risks

A

Learn this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly