module 1 Flashcards

1
Q

Q: Where are public cloud services hosted?

A

A: On hardware resources at the Cloud Service Provider’s (CSP) location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Q: Who can share the physical resources in a public cloud?

A

A: Any customer of the CSP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Q: What types of services do CSPs provide?

A

A: Cloud services such as storage space, applications, compute capacity, or network functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Q: What is one characteristic of the resources in a public cloud?

A

A: They are shared among multiple customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Q: Can customers directly access the hardware in a public cloud?

A

A: No, customers cannot access the hardware directly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Q: What do customers rely on from CSPs in a public cloud?

A

A: Security measures to protect data and resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Q: Does reliance on CSP security measures eliminate customer responsibility for data security?

A

A: No, customers still have responsibility for their data security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Q: What is the main concern for customers using a public cloud?

A

A: The security of their data and compliance with industry standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Q: What is a key consideration when selecting a CSP?

A

A: The adequacy of their security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Q: What should customers check regarding security in the SLA?

A

A: Security requirements and terms of agreement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Q: What is one requirement that may be included in the SLA?

A

A: Encryption of all data in transit or storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Q: What defines a private cloud service?

A

A: It is hosted on hardware resources used exclusively by a single organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Q: Where can the hardware for a private cloud be located?

A

A: In a CSP’s data center or the organization’s own data center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Q: What is a key characteristic of private cloud hardware usage?

A

A: No other organization can use the hardware for their own cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Q: What advantage does a private cloud provide in terms of configuration?

A

A: Greater control over the exact configuration of the hardware used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Q: What is a common motivation for deploying a private cloud on-premises?

A

A: The need to keep sensitive data on-site.

17
Q

Q: What technology is commonly used in traditional data centers?

A

A: Virtualization.

18
Q

Q: Does virtualization provide flexibility in hardware interaction?

A

A: Yes, it allows for flexible service deployment.

19
Q

Q: How are configurations in virtualization related to physical hardware?

A

A: They are closely tied to the underlying physical hardware.

20
Q

Q: What is a key advantage of a private cloud over traditional data centers?

A

A: Greater isolation and control over resources.

21
Q

Q: Can traditional data centers use cloud models?

A

A: Yes, but they may not provide the same level of service isolation as private clouds.

22
Q

Q: What is a potential limitation of virtualization in a traditional data center?

A

A: Dependence on the physical hardware for service configurations.

23
Q

Q: How is a cloud more abstracted from physical hardware?

A

A: Through a cloud API layer of communication managed by virtualization software.

24
Q

Q: What type of approach does private cloud security require?

A

A: A traditional approach to securing a network perimeter.

25
Q

Q: What components need to be secured in a virtual environment?

A

A: The hypervisor, virtual machines (VMs), and physical hosts.

26
Q

Q: How should systems be isolated on physical hosts?

A

A: By security zone, ensuring low-security systems are not on the same machine as high-security systems.

27
Q

Q: Why is it important to segment virtual systems from physical hosts?

A

A: To prevent guest machines from accessing the physical host’s systems and configurations inappropriately.

28
Q

Q: What is a hybrid cloud?

A

A mix of both public and private cloud components, or a combination of cloud and traditional on-prem services.

29
Q

Q: Why do some organizations opt for a hybrid cloud model?

A

A: Not every application, data set, or service is suitable for the cloud.

30
Q

Q: What is the most common cloud deployment model?

A

A: Hybrid cloud model.

31
Q

Q: Are most organizations fully committed to the cloud?

A

A: Relatively few organizations are ready or able to commit fully to the cloud.

32
Q

Q: What are the two main components of a hybrid cloud?

A

A: Public cloud and private cloud.

33
Q

Q: What kind of services can be included in a hybrid cloud model?

A

A: Both cloud services and traditional on-premises services.