Module 19 - Cloud Computing ( EC Mode Part 01 ) Flashcards
Which of the following cloud services provides features such as single sign-on, multi-factor authentication, identity governance and administration, access management, and intelligence collection?
A. IDaaS
B. PaaS
C. IaaS
D. SaaS
Answer: A. IDaaS (Identity as a Service)
Explanation:
IDaaS is a cloud-based service that provides secure and seamless access to applications, services, and resources. It includes features such as single sign-on (SSO), multi-factor authentication (MFA), identity governance and administration, access management, and intelligence collection.
A. IDaaS (Identity as a Service):
IDaaS is a cloud-based service that provides secure and seamless access to applications, services, and resources. It includes features such as single sign-on (SSO), multi-factor authentication (MFA), identity governance and administration, access management, and intelligence collection.
B. PaaS (Platform as a Service):
PaaS provides a platform for developers to build and deploy applications without having to manage the underlying infrastructure. It typically includes tools and frameworks for developing, testing, and deploying applications.
C. IaaS (Infrastructure as a Service):
IaaS provides access to virtualized computing resources over the internet. It includes features such as virtual machines, storage, and networking, and allows users to manage and scale their own infrastructure.
D. SaaS (Software as a Service):
SaaS provides access to software applications over the internet, typically through a web browser. Users do not need to install or maintain the software themselves, as it is hosted and managed by the SaaS provider.
Which of the following cloud deployment models is a combination of two or more clouds that remain unique entities but are bound together, where an organization makes available and manages some resources in-house and provides other resources externally?
A. Hybrid cloud
B. Public cloud
C. Community cloud
D. Multi-cloud
Answer: A. Hybrid cloud
Public Cloud:
In this model, the provider makes services such as applications, servers, and data storage available to the public over the Internet. Therefore, he is liable for the creation and constant maintenance of the public cloud and its IT resources. Public cloud services may be free or based on a pay-per-usage model (e.g., Amazon Elastic Compute Cloud (EC2), Google App Engine, Windows Azure Services Platform, IBM Bluemix).
Multi Cloud:
It is a dynamic heterogeneous environment that combines workloads across multiple cloud vendors that are managed via one proprietary interface to achieve long-term business goals. The multi cloud uses multiple computing and storage services from different cloud vendors. It distributes cloud assets, software, applications, etc. across various cloud-hosting environments.
Community Cloud:
It is a multi-tenant infrastructure shared among organizations from a specific community with common computing concerns, such as security, regulatory compliance, performance requirements, and jurisdiction. The community cloud can be either on- or off-premises and governed by the participated organizations or by a third-party managed service provider (e.g., Optum Health Cloud, Salesforce Health Cloud).
Hybrid Cloud:
It is a cloud environment comprised of two or more clouds (private, public, or community) that remain unique entities but are bound together to offer the benefits of multiple deployment models. In this model, the organization makes available and manages some resources in-house and provides other resources externally (e.g., Microsoft Azure, Zymr, Parangat, Logicalis).
Which of the following is the layer in the cloud storage architecture that performs several functions such as data de-duplication and data replication?
A. Back-end layer
B. Middleware layer
C. Application layer
D. Front-end layer
Answer: B. Middleware layer
Explanation:
Front-end layer:
The Front-end layer is accessed by the end user where it provides APIs for the management of data storage.
Middleware layer:
The Middleware layer performs several functions such as data de-duplication and replication of data.
Back-end layer:
The Back-end layer is where the hardware is implemented.
Application Layer:
The Application layer is a cloud security control layer that includes software development lifecycle, binary analysis, scanners, web app firewalls, transactional security, and other security mechanisms. It focuses on securing applications and data from external threats and attacks.
In one of the following characteristics of cloud computing, cloud systems employ the “pay-per-use” metering method, and subscribers pay for cloud services by monthly subscription or according to the usage of resources such as storage levels, processing power, and bandwidth. Which is this characteristic of cloud computing?
A. Measured service
B. Distributed storage
C. Virtualization technology
D. Distributed storage
Answer: A. Measured service
Explanation:
Distributed storage:
Distributed storage in the cloud offers better scalability, availability, and reliability of data. However, cloud distributed storage can potentially raise security and compliance concerns.
Automated management:
By minimizing user involvement, cloud automation speeds up the process and reduces labor costs and the possibility of human error.
Measured service:
Cloud systems employ the “pay-per-use” metering method. Subscribers pay for cloud services by monthly subscription or according to the usage of resources such as storage levels, processing power, and bandwidth. Cloud service providers monitor, control, report, and charge consumption of resources by customers with complete transparency.
Virtualization technology:
Virtualization technology in the cloud enables the rapid scaling of resources in a way that non-virtualized environments cannot achieve.
In which of the following characteristics of cloud computing does cloud automation expedite the process, reduce labor costs, and minimize the possibility of human error by minimizing user involvement?
A. Resource pooling
B. Automated management
C. Broad network access
D. Rapid elasticity
Answer: B. Automated management
Broad network access:
Cloud resources are available over the network and accessed through standard procedures via a wide variety of platforms, including laptops, mobile phones, and personal digital assistants (PDAs).
Rapid elasticity:
The cloud offers instant provisioning of capabilities to rapidly scale up or down, according to demand. To the consumers, the resources available for provisioning seem to be unlimited and can be purchased in any quantity at any point of time.
Resource pooling:
The cloud service provider pools all the resources together to serve multiple customers in the multi-tenant environment, with physical and virtual resources dynamically assigned and reassigned on demand by the consumer of the cloud.
Automated management:
By minimizing user involvement, cloud automation speeds up the process and reduces labor costs and the possibility of human error.
Which of the following actors in the NIST cloud deployment reference architecture acts as an intermediary for providing connectivity and transport services between cloud consumers and providers?
A. Cloud auditor
B. Cloud carrier
C. Cloud consumer
D. Cloud provider
Answer: B. Cloud carrier
Explanation:
Cloud Carrier:
A cloud carrier acts as an intermediary that provides connectivity and transport services between CSPs and cloud consumers. The cloud carrier provides access to consumers via a network, telecommunication, or other access devices.
Cloud Auditor:
A cloud auditor is a party that performs an independent examination of cloud service controls to express an opinion thereon. Audits verify adherence to standards through a review of the objective evidence.
Cloud Consumer:
A cloud consumer is a person or organization that maintains a business relationship with the cloud service providers (CSPs) and utilizes the cloud computing services.
Cloud Provider:
A cloud provider is a person or organization who acquires and manages the computing infrastructure intended for providing services (directly or via a cloud broker) to interested parties via network access.
Highlander, Incorporated, is a medical insurance company with several regional company offices in North America. There are various types of employees working in the company, including technical teams, sales teams, and work-from-home employees. Highlander takes care of the security patches and updates of official computers and laptops; however, the computers or laptops of the work-from-home employees are to be managed by the employees or their ISPs. Highlander employs various group policies to restrict the installation of any third-party applications.
As per Highlander’s policy, all the employees are able to utilize their personal smartphones to access the company email in order to respond to requests for updates. Employees are responsible for keeping their phones up to date with the latest patches. The phones are not used to directly connect to any other resources in the Highlander, Incorporated, network.
The database that hosts the information collected from the insurance application is hosted on a cloud-based file server, and their email server is hosted on Office 365. Other files created by employees get saved to a cloud-based file server, and the company uses work folders to synchronize offline copies back to their devices. Apart from Highlander employees, no one can access the cloud service.
Quiz: What type of cloud service is Highlander using?
A. Public cloud
B. Hybrid cloud
C. Private cloud
D. Community cloud
Answer: C. Private cloud
Explanation:
Private Cloud:
A private cloud, also known as internal or corporate cloud, is a cloud infrastructure that a single organization operates solely. The organization can implement the private cloud within a corporate firewall. Organizations deploy private cloud infrastructures to retain full control over corporate data.
Public Cloud:
In this model, the provider makes services such as applications, servers, and data storage available to the public over the Internet. In this model, the cloud provider is liable for the creation and constant maintenance of the public cloud and its IT resources.
Community Cloud:
It is a multi-tenant infrastructure shared among organizations from a specific community with common computing concerns such as security, regulatory compliance, performance requirements, and jurisdiction.
Hybrid Cloud:
It is a cloud environment comprised of two or more clouds (private, public, or community) that remain unique entities but bound together for offering the benefits of multiple deployment models.
Which of the following three service models are the standard cloud service models?
A. SaaS, IaaS, and hybrid
B. SaaS, PaaS, and IaaS
C. XaaS, private, and public
D. Private, public, and community
Answer: B. SaaS, PaaS, and IaaS
Explanation:
Option (a) is the only selection that includes all of the correct cloud service models: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).
Options (b) to (d) do not contain all three correct cloud service models. They contain one or two of the models, plus a cloud deployment type, such as private cloud or hybrid cloud.
What type of cloud service model will the new e-mail system be running on if XYZ Corp. migrates its legacy on-premise e-mail system to a cloud-based e-mail provider?
A. IaaS
B. XaaS
C. PaaS
D. SaaS
Answer: D. SaaS
Explanation:
SaaS is a correct cloud service model because it involves purchasing the use of software that is based in the cloud and accessed over the Internet.
IaaS (Infrastructure as a Service) and PaaS (Platform as a Service) are also valid cloud service models. IaaS provides virtualized computing resources over the internet, while PaaS offers a platform for developing, running, and managing applications without the complexity of infrastructure management.
XaaS is not a specific cloud service model, but rather a term used to refer to “anything as a service,” which can encompass a variety of cloud service models and deployment types.
Therefore, the statement that IaaS/PaaS/XaaS are not correct cloud service models is incorrect.
Which of the following services and deployment models would meet the requirements of XYZ Partners LLC, a cloud-based startup that needs to run their Windows server VMs and directory services from the cloud and must be SOC 2 compliant while storing sensitive PII?
A. XaaS and community
B. PaaS and public
C. IaaS and private
D. SaaS and hybrid
Answer: C. IaaS and private
Explanation:
IaaS is a correct cloud service model that allows access to individual VMs and provides granular control over everything. A private deployment model ensures that only the individual company’s data is stored on the cloud, providing added security.
PaaS is also a valid cloud service model that provides a platform for developing, running, and managing applications without the complexity of infrastructure management. However, the statement that public cloud is not as secure as private is debatable and depends on the specific security measures implemented by the cloud service provider.
SaaS is another correct cloud service model that provides access to software applications that are hosted in the cloud and accessed over the internet.
Hybrid is a valid cloud deployment model that combines two or more cloud service models (private, public, or community) to provide the benefits of multiple deployment models. However, the statement that it is not as secure as private is debatable and depends on the specific security measures implemented by the cloud service provider.
XaaS is not a specific cloud service model but rather a term used to refer to “anything as a service,” which can encompass a variety of cloud service models and deployment types. Community cloud is a valid cloud deployment model that is shared among organizations with common computing concerns, such as security, compliance, and jurisdiction.
Therefore, the statement that PaaS and public, SaaS and hybrid, and XaaS and community are not correct cloud service models or deployment types is incorrect.
In which of the following cloud deployment models does the provider make services such as applications, servers, and data storage available to the public over the Internet?
A. Community cloud
B. Public cloud
C. Private cloud
D. Hybrid cloud
Answer: B. Public cloud
Explanation:
Public Cloud:
In this model, the provider makes services such as applications, servers, and data storage available to the public over the Internet. The cloud provider is responsible for creating and maintaining the public cloud and its IT resources.
Private Cloud:
A private cloud, also known as internal or corporate cloud, is a cloud infrastructure that a single organization operates solely.
Community Cloud:
It is a multi-tenant infrastructure shared among organizations from a specific community with common computing concerns such as security, regulatory compliance, performance requirements, and jurisdiction.
Hybrid Cloud:
It is a cloud environment comprised of two or more clouds (private, public, or community) that remain unique entities but are bound together to offer the benefits of multiple deployment models.
Which of the following NIST cloud reference architecture factors manages cloud services in terms of use, performance, and delivery, and who also maintains a relationship between cloud providers and consumers?
A. Cloud consumer
B. Cloud provider
C. Cloud broker
D. Cloud carrier
Answer: C. Cloud broker
Explanation:
Cloud Consumer:
A cloud consumer is a person or organization that maintains a business relationship with cloud service providers and uses cloud computing services. The cloud consumer browses the CSP’s service catalog, requests the desired services, sets up service contracts with the CSP (either directly or via a cloud broker), and uses the service.
Cloud Provider:
A cloud provider is a person or organization who acquires and manages the computing infrastructure intended for providing services (directly or via a cloud broker) to interested parties via network access.
Cloud Broker:
Integration of cloud services is becoming too complicated for cloud consumers to manage. Thus, a cloud consumer may request cloud services from a cloud broker, rather than directly contacting a CSP. The cloud broker is an entity that manages cloud services regarding use, performance, and delivery, and maintains the relationship between CSPs and cloud consumers.
Cloud Carrier:
A cloud carrier acts as an intermediary that provides connectivity and transport services between CSPs and cloud consumers. The cloud carrier provides access to consumers via a network, telecommunication, and other access devices.
Which of the following is a cloud-computing and remote-access service that offers anything as a service over the Internet based on the user’s demand?
A. DaaS
B. FWaaS
C. MBaaS
D. XaaS
Answer: D. XaaS
Explanation:
Anything-as-a-Service (XaaS):
Anything as a service or everything as a service (XaaS) is a cloud-computing and remote-access service that offers anything as a service over the Internet based on the user’s demand. XaaS offers secure services such as customer relationship management (CRM), cloud computing, and directory services (e.g., NetApp, AWS Elastic Beanstalk, Heroku, and Apache Stratos).
Firewalls-as-a-Service (FWaaS):
This cloud computing service protects users and organizations from both internal and external threats by filtering the network traffic. FWaaS includes enhanced data analysis capabilities, including the ability to detect malware attacks, in addition to security functionality such as packet filtering, network analyzing, and IPsec (e.g., Zscaler Cloud Firewall, SecurityHQ, Secucloud, Fortinet, Cisco, and Sophos).
Desktop-as-a-Service (DaaS):
This cloud computing service offers on-demand virtual desktops and apps to subscribers. Cloud service providers are responsible for providing infrastructure, computing power, data storage, backup, patching, and maintenance. Cloud providers deliver DaaS as a multi-tenancy subscription. The provider charges for the service with a predictable pay-as-you-need model (e.g., Amazon WorkSpaces, Citrix Managed Desktops, and Azure Windows Virtual Desktop).
Mobile Backend-as-a-Service (MBaaS):
This cloud computing service allows app developers to integrate their front-end applications with backend infrastructure through an application programming interface (API) and software development kit (SDK). This service reduces the time developers spend on developing backend functionality. It provides user management, push notifications, cloud storage, database management, and geolocation to develop applications (e.g., Google’s Firebase, AWS Amplify, Kinvey, Apple’s CloudKit, and Backendless Cloud).
Identify the cloud computing service that protects users and organizations from both internal and external threats by filtering network traffic and includes the ability to detect malware attacks, in addition to security functionalities such as packet filtering, network analyzing, and IPsec.
A. IDaaS
B. CaaS
C. FWaaS
D. FaaS
Answer: C. FWaaS
Explanation:
Identity-as-a-Service (IDaaS):
This cloud computing service offers authentication services to the subscribed enterprises and is managed by a third-party vendor to provide identity and access management services. It provides services such as Single-Sign-On (SSO), Multi-Factor-Authentication (MFA), Identity Governance and Administration (IGA), access management, and intelligence collection. These services allow subscribers to access sensitive data more securely both on and off-premises (e.g., OneLogin, Centrify Identity Service, Microsoft Azure Active Directory, Okta).
Firewalls-as-a-Service (FWaaS):
This cloud computing service protects users and organizations from both internal and external threats by filtering the network traffic. FWaaS includes enhanced data analysis capabilities, including the ability to detect malware attacks, in addition to security functionality such as packet filtering, network analyzing, and IPsec (e.g., Zscaler Cloud Firewall, SecurityHQ, Secucloud, Fortinet, Cisco, and Sophos).
Container-as-a-Service (CaaS):
This cloud computing model provides containers and clusters as a service to its subscribers. It provides services such as virtualization of container engines, management of containers, applications, and clusters through a web portal or an API. Using these services, subscribers can develop rich scalable containerized applications through the cloud or on-site data centers. CaaS inherits features of both IaaS and PaaS (e.g., Amazon EC2, Google Kubernetes Engine (GKE)).
Function-as-a-Service (FaaS):
This cloud computing service provides a platform for developing, running, and managing application functionalities without the complexity of building and maintaining necessary infrastructure (serverless architecture). This model is mostly used while developing applications for microservices. It provides on-demand functionality to the subscribers that powers off the supporting infrastructure and incurs no charges when not in use. It provides data processing services, such as Internet of Things (IoT) services for connected devices, mobile and web applications, and batch-and-stream processing (e.g., AWS Lambda, Google Cloud Functions, Microsoft Azure Functions, Oracle Functions).
Which of the following cloud computing models allows manufacturers to sell or lease equipment to clients and receive a percentage of profits generated by that equipment?
A. PaaS
B. SECaaS
C. MaaS
D. FWaaS
Answer: C. MaaS
Explanation:
Machines-as-a-Service (MaaS) Business Model:
This type of cloud computing model, also known as Equipment-as-a-Service (EaaS), allows manufacturers to sell or lease machines to clients and receive a percentage of profits generated by those machines. This model is extensively utilized and implemented to benefit both manufactures as well as clients. It is a sophisticated cloud model that allows the client and manufacturer to generate and track real-time products from the machine.
Firewalls-as-a-Service (FWaaS):
This cloud computing service protects users and organizations from both internal and external threats by filtering the network traffic. FWaaS includes enhanced data analysis capabilities, including the ability to detect malware attacks, in addition to security functionality such as packet filtering, network analyzing, and IPsec (e.g., Zscaler Cloud Firewall, SecurityHQ, Secucloud, Fortinet, Cisco, and Sophos).
Platform-as-a-Service (PaaS):
This type of cloud computing service allows for the development of applications and services. Subscribers need not buy and manage the software and infrastructure underneath it but have authority over deployed applications and perhaps application hosting environment configurations. This offers development tools, configuration management, and deployment platforms on-demand, which can be used by subscribers to develop custom applications (e.g., Google App Engine, Salesforce, Microsoft Azure).
Security-as-a-Service (SECaaS):
This cloud computing model integrates security services into corporate infrastructure in a cost-effective way. It is developed based on SaaS and does not require any physical hardware or equipment. Therefore, it drastically reduces the cost compared to that spent when organizations establish their own security capabilities. It provides services such as penetration testing, authentication, intrusion detection, anti-malware, security incident and event management (e.g., eSentire MDR, Switchfast Technologies, OneNeck IT Solutions, Foundstone Managed Security Services).
Which of the following types of cloud platforms is most secure?
A. Internal
B. Hybrid
C. Public
D. Private
Answer: D. Private
Explanation for (a):
A private cloud platform is the most secure as it is owned and maintained by a single entity that has the flexibility of the cloud but the security and control of hosting on-premise.
Explanation for (b):
Public cloud platforms are not as secure as private clouds, as they are open to the public and rely on the cloud provider for security measures.
Explanation for (c):
Hybrid cloud platforms combine private and public cloud models, and while they can offer increased security compared to public clouds, they are not as secure as private clouds.
Explanation for (d):
Internal cloud platforms are not a common cloud deployment model and are not as secure as private clouds, as they are still within the organization’s network and may not have the same security measures as a private cloud.
You are a security engineer for XYZ Corp. You are looking for a cloud-based e-mail provider to migrate the company’s legacy on-premise e-mail system to. What type of cloud service model will the new e-mail system be running on?
A. SaaS
B. PaaS
C. IaaS
D. XaaS
Answer: A. SaaS
Explanation:
SaaS is correct because you are purchasing the use of software that is based in the cloud.
IaaS/PaaS/XaaS are not correct because they either have different uses or are not an existing cloud service model.
In which of the following cloud deployment models is a highly flexible model that holds several types of cloud services that can be supplied to different other clouds to help users choose a specific feature required from each cloud?
A. Private cloud
B. Poly cloud
C. Distributed cloud
D. Public cloud
Answer: B. Poly cloud
Explanation:
Public Cloud: In this model, the provider makes services such as applications, servers, and data storage available to the public over the Internet. Therefore, he is liable for the creation and constant maintenance of the public cloud and its IT resources. Public cloud services may be free or based on a pay-per-usage model (e.g., Amazon Elastic Compute Cloud (EC2), Google App Engine, Windows Azure Services Platform, IBM Bluemix).
Private Cloud: A private cloud, also known as the internal or corporate cloud, is a cloud infrastructure operated by a single organization and implemented within a corporate firewall. Organizations deploy private cloud infrastructures to retain full control over corporate data (e.g., BMC Software, VMware vRealize Suite, SAP Cloud Platform).
Distributed Cloud: It is a centralized cloud environment comprised of geographically distributed public or private clouds controlled on a single control plane for providing services to the end users located on or off site. In this model, the end user can access data anywhere as a local data center providing edge computing capability for improving data privacy and meeting local governance policies.
Poly Cloud: This type of cloud technology holds several types of cloud services, which can be supplied to different other clouds. Unlike a multi cloud, it provides features of various clouds on a single platform to provide users with features from different cloud services based on their requirement. This model also helps users choose a specific feature required from each cloud to perform different tasks in their business environment. It provides specialized automation applications such as AI and ML services (e.g., Google Cloud Platform (GCP) and Amazon Web Services (AWS)).
Which of the following cloud broker services improves a given function by a specific capability and provides value-added services to cloud consumers?
A. Service arbitrage
B. Service aggregation
C. Distributed storage
D. Service intermediation
Answer: D. Service intermediation
explanation:
Service Intermediation:
Improves a given function by a specific capability and provides value-added services to cloud consumers.
Service Aggregation:
Combines and integrates multiple services into one or more new services.
Service Arbitrage:
It is like service aggregation but without the fixing of the aggregated services (the cloud broker can choose services from multiple agencies).
Distributed Storage:
Distributed storage is a characteristic of cloud computing that offers better scalability, availability, and reliability of data. However, cloud distributed storage can potentially raise security and compliance concerns.
Highlander, Incorporated, is a medical insurance company with several regional company offices in North America. There are various types of employees working in the company, including technical teams, sales teams, and work-from-home employees. Highlander takes care of the security patches and updates of official computers and laptops; however, the computers or laptops of the work-from-home employees are to be managed by the employees or their ISPs. Highlander employs various group policies to restrict the installation of any third-party applications.
As per Highlander’s policy, all the employees are able to utilize their personal smartphones to access the company email in order to respond to requests for updates. Employees are responsible for keeping their phones up to date with the latest patches. The phones are not used to directly connect to any other resources in the Highlander, Incorporated, network.
The database that hosts the information collected from the insurance application is hosted on a cloud-based file server, and their email server is hosted on Office 365. Other files created by employees get saved to a cloud-based file server, and the company uses work folders to synchronize offline copies back to their devices. Apart from Highlander employees, no one can access the cloud service.
Quiz: What type of cloud service is Highlander, Incorporated, using?
A. Private cloud
B. Public cloud
C. Community cloud
D. Hybrid cloud
Answer: A. Private cloud
Explanation:
Private Cloud:
A private cloud, also known as internal or corporate cloud, is a cloud infrastructure that a single organization operates solely. The organization can implement the private cloud within a corporate firewall. Organizations deploy private cloud infrastructures to retain full control over corporate data.
Public Cloud:
In this model, the provider makes services such as applications, servers, and data storage available to the public over the Internet. In this model, the cloud provider is liable for the creation and constant maintenance of the public cloud and its IT resources.
Community Cloud:
It is a multi-tenant infrastructure shared among organizations from a specific community with common computing concerns such as security, regulatory compliance, performance requirements, and jurisdiction.
Hybrid Cloud:
It is a cloud environment comprised of two or more clouds (private, public, or community) that remain unique entities but bound together for offering the benefits of multiple deployment models.
Which of the following types of cloud computing services provides virtual machines and other abstracted hardware and operating systems (OSs) which may be controlled through a service API?
A. XaaS
B. PaaS
C. SaaS
D. IaaS
Answer: D. IaaS
Explanation:
Infrastructure-as-a-Service (IaaS): This cloud computing service enables subscribers to use on demand fundamental IT resources such as computing power, virtualization, data storage, network, and so on. This service provides virtual machines and other abstracted hardware and operating systems (OSs) which may be controlled through a service API. As cloud service providers are responsible for managing the underlying cloud-computing infrastructure, subscribers can avoid costs of human capital, hardware, and others (e.g., Amazon EC2, Go grid, Sungrid, Windows SkyDrive, Rackspace.com, etc.).
Platform-as-a-Service (PaaS): This type of cloud computing service offers the platform for the development of applications and services. Subscribers need not to buy and manage the software and infrastructure underneath it but have authority over deployed applications and perhaps application hosting environment configurations. This offers development tools, configuration management, and deployment platforms on-demand that can be used by subscribers to develop custom applications (E.g., Intel MashMaker, Google App Engine, Force.com, Microsoft Azure, etc.).
Software-as-a-Service (SaaS): This cloud computing service offers application software to subscribers on demand over the Internet; the provider charges for it on a pay-per-use basis, by subscription, by advertising, or by sharing among multiple users (E.g. web-based office applications like Google Docs or Calendar, Salesforce CRM, Freshbooks, Basecamp, etc.).
Anything-as-a-Service (XaaS): It is also known as everything-as-a-service. It includes all the other types of cloud services.
Which of the following cloud computing services allows app developers to integrate their frontend applications with backend infrastructure through an application programming interface (API) and software development kit (SDK)?
A. MBaaS
B. FWaaS
C. DaaS
D. IDaaS
Answer: A. MBaaS
Explanation:
Identity-as-a-Service (IDaaS): This cloud computing service offers authentication services to the subscribed enterprises and is managed by a third-party vendor to provide identity and access management services. It provides services such as Single-Sign-On (SSO), Multi-Factor-Authentication (MFA), Identity Governance and Administration (IGA), access management, and intelligence collection. These services allow subscribers to access sensitive data more securely both on and off-premises (e.g., OneLogin, Centrify Identity Service, Microsoft Azure Active Directory, Okta).
Firewalls-as-a-Service (FWaaS): This cloud computing service protects users and organizations from both internal and external threats by filtering the network traffic. FWaaS includes enhanced data analysis capabilities, including the ability to detect malware attacks, in addition to security functionality such as packet filtering, network analyzing, and IPsec (e.g., Zscaler Cloud Firewall, SecurityHQ, Secucloud, Fortinet, Cisco, and Sophos).
Desktop-as-a-Service (DaaS): This cloud computing service offers on-demand virtual desktops and apps to subscribers. Cloud service providers are responsible for providing infrastructure, computing power, data storage, backup, patching, and maintenance. Cloud providers deliver DaaS as a multi-tenancy subscription. The provider charges for the service with a predictable pay-as-you-need model (e.g., Amazon WorkSpaces, Citrix Managed Desktops, and Azure Windows Virtual Desktop).
Mobile Backend-as-a-Service (MBaaS): This cloud computing service allows app developers to integrate their front-end applications with backend infrastructure through an application programming interface (API) and software development kit (SDK). This service reduces the time developers spend on developing backend functionality. It provides user management, push notifications, cloud storage, database management, and geolocation to develop applications (e.g., Google’s Firebase, AWS Amplify, Kinvey, Apple’s CloudKit, and Backendless Cloud).
Which of the following cloud deployment models is a highly flexible model that holds several types of cloud services that can be supplied to different other clouds to help users choose a specific feature required from each cloud?
A. Distributed cloud
B. Public cloud
C. Private cloud
D. Poly cloud
Answer: D. Poly cloud
Explanation:
Public Cloud: In this model, the provider makes services such as applications, servers, and data storage available to the public over the Internet. Therefore, he is liable for the creation and constant maintenance of the public cloud and its IT resources. Public cloud services may be free or based on a pay-per-usage model (e.g., Amazon Elastic Compute Cloud (EC2), Google App Engine, Windows Azure Services Platform, IBM Bluemix).
Private Cloud: A private cloud, also known as the internal or corporate cloud, is a cloud infrastructure operated by a single organization and implemented within a corporate firewall. Organizations deploy private cloud infrastructures to retain full control over corporate data (e.g., BMC Software, VMware vRealize Suite, SAP Cloud Platform).
Distributed Cloud: It is a centralized cloud environment comprised of geographically distributed public or private clouds controlled on a single control plane for providing services to the end users located on or off site. In this model, the end user can access data anywhere as a local data center providing edge computing capability for improving data privacy and meeting local governance policies.
Poly Cloud: This type of cloud technology holds several types of cloud services, which can be supplied to different other clouds. Unlike a multi cloud, it provides features of various clouds on a single platform to provide users with features from different cloud services based on their requirement. This model also helps users choose a specific feature required from each cloud to perform different tasks in their business environment. It provides specialized automation applications such as AI and ML services (e.g., Google Cloud Platform (GCP) and Amazon Web Services (AWS)).
Which of the following cloud platforms is most secure?
A. Internal
B. Hybrid
C. Public
D. Private
Answer: D. Private
Explanation:
A private cloud platform is the most secure as it is owned and maintained by a single entity that has the flexibility of the cloud but the security and control of hosting on-premise.
Public/hybrid/internal cloud platforms are not correct answers because they are not as secure.
Which of the following tiers in the container technology architecture transforms images into containers and deploys containers to hosts?
A. Tier 1: Developer machines
B. Tier 2: Testing and accreditation systems
C. Tier 3: Registries
D. Tier 4: Orchestrators
Answer: D. Tier 4: Orchestrators
Tier-1: Developer machines - image creation, testing and accreditation
Tier-2: Testing and accreditation systems - verification and validation of image contents, signing images and sending them to the registries
Tier-3: Registries - storing images and disseminating images to the orchestrators based on requests
Tier-4: Orchestrators - transforming images into containers and deploying containers to hosts
Which of the following is a docker remote driver that is a network plugin used to build a virtual network for connecting docker containers spread across multiple clouds?
A. Kuryr
B. Weave
C. Contiv
D. MACVLAN
Answer: B. Weave
Explanation:
Contiv: Contiv is an open-source network plugin introduced by Cisco for building security and infrastructure policies for multi-tenant microservices deployments.
Weave: Weave is a network plugin that is used to build a virtual network for connecting Docker containers spread across multiple clouds.
Kuryr: Kuryr is a network plugin that implements the Docker libnetwork remote driver by using Neutron, an OpenStack networking service, and also includes an IPAM driver.
MACVLAN: A macvlan driver is used to create a network connection between container interfaces and the parent host interface or sub-interfaces using the Linux MACVLAN bridge mode. It is a native network driver of a Docker engine.
Which of the following tiers in the container technology architecture operates and manages containers as instructed by the orchestrator?
A. Tier 5: Hosts
B. Tier 3: Registries
C. Tier 1: Developer machines
D. Tier 2: Testing and accreditation systems
Answer: A. Tier 5: Hosts
Tier-1: Developer machines - image creation, testing and accreditation
Tier-2: Testing and accreditation systems - verification and validation of image contents, signing images and sending them to the registries
Tier-3: Registries - storing images and disseminating images to the orchestrators based on requests
Tier-4: Orchestrators - transforming images into containers and deploying containers to hosts
Tier-5: Hosts - operating and managing containers as instructed by the orchestrator
Which of the following docker objects are read-only binary templates with instructions for container creation and are used to store and deploy containers?
A. Services
B. Networking
C. Images
D. Volumes
Answer: C. Images
Images:
Images are used to store and deploy containers. They are read-only binary templates with instructions for container creation.
Services:
Services enable users to extend the number of containers across daemons, and together they serve as a swarm with several managers and workers. Each swarm member is a daemon, and all these daemons can interact with each other using Docker API.
Networking:
It is a channel through which all isolated containers communicate.
Volumes:
It is a storage where persisting data created by Docker and used by Docker containers are stored.
Which of the following is the docker native network driver that implements its own networking stack and is isolated completely from the host networking stack?
Answer Options:
A. None
B. MACVLAN
C. Overlay
D. Host
Answer:
A. None
Host:
By using a host driver, a container implements the host networking stack.
Overlay:
An overlay driver is used to enable container communication over the physical network infrastructure.
MACVLAN:
A macvlan driver is used to create a network connection between container interfaces and the parent host interface or sub-interfaces using the Linux MACVLAN bridge mode.
None:
A none driver implements its own networking stack and is isolated completely from the host networking stack.
Which of the following constructs of the container network model comprises the container network stack configuration for the management of container interfaces, routing tables, and DNS settings?
Answer Options:
A. Bridge
B. Endpoint
C. Network
D. Sandbox
Answer:
D. Sandbox
Endpoint: An endpoint is a connection point for applications to access a network. It is abstracted away from the application to maintain portability and allows services to implement different network drivers.
Network: A network is a collection of interconnected endpoints. Endpoints without a network connection cannot communicate over the network.
Sandbox: A sandbox is a container’s network stack configuration that manages container interfaces, routing tables, and DNS settings.
Bridge: A bridge is a component of Docker’s native network drivers. The bridge driver creates a Linux bridge on the host that is managed by Docker.
Which of the following node components of the Kubernetes cluster architecture is an important service agent that runs on each node and ensures that containers run in a pod?
Answer Options:
A. Etcd cluster
B. Kubelet
C. Kube-proxy
D. Container runtime
Answer:
The correct answer is B. Kubelet
Explanation:
Kube-proxy: It is a network proxy service that also runs on every worker node. This service maintains the network rules that enable network connection to the pods.
Etcd cluster: It is a distributed and consistent key-value storage where Kubernetes cluster data, service discovery details, API objects, etc. are stored. It is a master node component.
Container Runtime: Container runtime is a software designed to run the containers. Kurbernetes supports various container runtimes, such as Docker, rktlet, containerd, and cri-o.
Kubelet: Kubelet is an important service agent that runs on each node and ensures containers running in a pod. It also ensures pods and containers are healthy and running as expected. Kubelet does not handle containers that are not generated by Kubernetes.
Which of the following is the property of container technology that makes it less secure than virtual machines?
Answer Options:
A. Created and launched in minutes
B. Process-level isolation
C. Heavyweight
D. Complete isolation
Answer:
The correct answer is B. Process-level isolation
Explanation:
Virtual Machines:
Heavyweight
Run on independent operating systems
Hardware-based virtualization
Slower provisioning
Limited performance
Completely isolated making it more secure
Created and launched in minutes
Containers:
Lightweight and portable
Share a single host operating system
OS-based virtualization
Scalable and real-time provisioning
Native performance
Process-level isolation, partially secured
Created and launched in seconds
Which of the following serverless computing platforms allows users to run code without provisioning and managing servers?
Answer Options:
A. Portainer
B. Microsoft Azure Functions
C. Knative
D. Red Hat OpenShift
Answer:
The correct answer is B. Microsoft Azure Functions
Portainer and Red Hat OpenShift Container Platform are container management platforms.
Microsoft Azure Functions is a serverless computing platform that allows users to run code without provisioning and managing servers.
Knative is a Kubernetes-based platform to build, deploy, and manage modern serverless workloads.
Which of the following components in the container network model assigns default subnet and IP addresses to the endpoints and networks if they are not assigned?
Answer Options:
A. IPAM drivers
B. Network drivers
C. Sandbox
D. Endpoint
Answer:
The correct answer is A. IPAM drivers
Sandbox: Sandbox comprises the container network stack configuration for the management of container interfaces, routing tables, and domain name system (DNS) settings.
Endpoint: To maintain application portability, an endpoint is connected to a network and is abstracted away from the application, so that services can implement different network drivers.
Network Drivers: The network functions through the implementation of Docker network drivers. These drivers are pluggable so that multiple network drivers can be used concurrently on the same network. There are two types of CNM network drivers: namely native and remote network drivers.
IPAM Drivers: IP address management (IPAM) drivers assign default subnet and IP addresses to the endpoints and networks if they are not assigned.
Which of the following processes manages the lifecycles of software containers and schedules and distributes the work of individual containers for microservices-based applications?
Answer Options:
A. Microservices
B. Domain snipping
C. Sandbox
D. Container orchestration
Answer:
The correct answer is D. Container orchestration
Explanation:
Container Orchestration: Container orchestration is an automated process of managing the lifecycles of software containers and their dynamic environments. It is used for scheduling and distributing the work of individual containers for microservices-based applications spread across multiple clusters.
Sandbox: A sandbox comprises the container network stack configuration for the management of container interfaces, routing tables, and domain name system (DNS) settings.
Domain Snipping: Domain snipping involves registering an elapsed domain name. It allows multiple microservices to work together within a specific domain.
Microservices: Monolithic applications are broken down into cloud-hosted sub-applications called microservices that work together, each performing a unique task. As each microservice is packaged into the Docker container along with the required libraries, frameworks, and configuration files, microservices belonging to a single application can be developed and managed using multiple platforms.
Which of the following docker components processes API requests and handles various docker objects, such as containers, volumes, images, and networks?
Answer Options:
A. Docker registries
B. Docker images
C. Docker client
D. Docker daemon
Answer:
The correct answer is D. Docker daemon
Explanation:
Docker Client: The Docker client is the primary interface that users use to communicate with Docker. When users enter Docker commands such as “docker run”, the client passes the commands to the Docker daemon for execution via the Docker API.
Docker Daemon: The Docker daemon (dockerd) is responsible for handling various Docker objects such as containers, images, volumes, and networks. It listens for Docker API requests and processes them accordingly.
Docker Images: Docker images are read-only templates that contain instructions for creating Docker containers. Images are used to store and distribute containerized applications and can be shared between multiple hosts. Docker images are built using a Dockerfile, which is a script that contains a set of instructions for building an image.
Docker Registries: Docker registries are locations where Docker images are stored and retrieved. Docker Hub is a public registry that allows developers to share and distribute their Docker images. Private registries can also be used for internal distribution of Docker images within an organization.
Which of the following components of the container network model is connected to a network and is abstracted away from an application so that services can implement different network drivers?
Answer Options:
A. Bridge
B. Endpoint
C. Network
D. Sandbox
Answer:
The correct answer is B. Endpoint
Explanation:
Endpoint: An endpoint is a virtual object in Kubernetes that abstracts the details of a Kubernetes service. It allows the service to be easily changed without affecting the endpoint, which provides stability to the service’s consumers.
Network: In Kubernetes, a network is a set of nodes and their associated resources that are used to communicate with each other. It allows the containers and services running in the cluster to communicate with each other.
Sandbox: A sandbox is a container used by Kubernetes to isolate the network resources of a pod. It includes the network stack, IP address, and routing table for the pod.
Bridge: A bridge is a component of the Docker native network drivers that creates a virtual network interface on the host machine. It allows containers to communicate with each other and with the outside world.
Which of the following technologies is a function as a service (FaaS) and a cloud-based application architecture that simplifies the process of application deployment and eliminates the need for developers to manage the server and hardware?
Answer Options:
A. Docker
B. Container
C. Serverless computing
D. Kubernetes
Answer:
The correct answer is C. Serverless computing
Container:
A container is a self-contained package of software and all its dependencies, designed to run independently of other processes in the cloud environment. Container-as-a-Service (CaaS) is a service that includes the virtualization of containers and container management through orchestrators, enabling subscribers to develop rich, scalable containerized applications on the cloud or on-site data centers.
Serverless computing:
Serverless computing, also known as serverless architecture or Function-as-a-Service (FaaS), is a cloud-based application architecture in which the cloud vendor provides the application infrastructure and supporting services as they are needed. This simplifies the process of application deployment and eliminates the need for developers to manage the server and hardware.
Kubernetes:
Kubernetes, or K8s, is an open-source, portable, extensible orchestration platform developed by Google for managing containerized applications and microservices. Kubernetes provides a resilient framework for managing distributed containers, generating deployment patterns, and performing failover and redundancy for applications.
Docker:
Docker is an open-source technology used for developing, packaging, and running applications and all their dependencies in the form of containers, ensuring seamless application execution in any environment. Docker provides a Platform-as-a-Service (PaaS) through OS-level virtualization and delivers containerized software packages.
Which of the following components of the docker engine allows the communication and assignment of tasks to the daemon?
Answer Options:
A. Server
B. Rest API
C. Docker swarm
D. Client CLI
Answer:
The correct answer is B. Rest API
Client CLI: It is the command-line interface used to communicate with the daemon and where various Docker commands are initiated.
Rest API: This API allows the communication and assignment of tasks to the daemon.
Server: It is a persistent back-end process, also known as a daemon process (dockerd command).
Docker Swarm: The Docker engine supports the swarm mode that allows managing multiple Docker engines within the Docker platform. Docker CLI is used for creating a swarm, deploying an application to the swarm, and handling its activity or behavior.