RISK Flashcards

1
Q

RISK by Svc Models
What Risk is addressed by SaaS?

What (4) environments are affected?

A

Consumer – Multi-Tenants may share same applic stack ie: (4)
WEB, DB, APP, Ntwk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

RISK by Svc Models

What Risk is addressed by PaaS?

A

Build – Vuln in Platform stack BLEEDS sharing data BU, archives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

RISK by Svc Models

What Risk is addressed by IaaS?

A

HOST – Cross Ntwk traffic listeners find host less hardened/ptch’d other Tenants

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are 5 characteristics of Cloud? BORRM

A
Broad Network Access – 
On Demand Svc – 
Rapid Elasticity – 
Resource Pooling – 
Measured Svc Pay-as-Go –
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

As part of a cloud provider’s services, customers can provision a new virtual machine as needed without human interaction with the provider. This scenario is BEST described by which of the following cloud characteristics?

A. On-demand self-service
B. Measured service
C. Broad network access
D. Rapid elasticity

A

A. On-demand self-service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is the MOST important service management consequence of elastic capacity?

A. The need for better application development
B. The need for better security management
C. The need for good performance monitoring and management
D. The need to improve the fulfillment and provisioning process

A

C. The need for good performance monitoring and management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is the MOST important impact of cloud computing on managing service levels?

A. Capacity can be more elastic.
B. External providers can deny a capacity increase when required.
C. Providers measure their own performance.
D. Scarcity of resources can occur if not monitored

A

A. Capacity can be more elastic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following does IT outsourcing and cloud computing typically have in common?

A. Pay as you go agreements
B. Short-term financial commitment
C. Tailor-made applications based on client needs
D. Vendor lock-in potential

A

D. Vendor lock-in potential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of attack is Heartbleed ?
How is it detected?
What does it affect?

A

RAM read attack – OPEN SSL – Detects heartbleed TLS used – network session keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of attack is Petya?
What does it target?
What does it do?

A

Ransomware - WIN MB Record - Encrypts HDD prevents WIN reboot

Encrypts Ransomware – Target WIN MB Rec. Encrypts HDD Prevents WIN Boot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of attack is Wanna Cry?
What does it target?
What type of vulnerability?

A

Ransomware – Target WIN - Crypto Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of attack is Poodle?
What does it target?
what type of weakness does it attack?

A

PAD Oracle - SSL 3.0 - MitM plain txt
PAD Oracle on Downgrade Legacy Encryption – Target browser relies on SSL 3. 0 Protocol weakness allows MiTM attack to see plain txt content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Broad Netwk Access?

A

Cloud benefit: Available by phone, PC, anywhere

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is On Demand Service?

A

Request what you need, when you need it: Server, Storage, automated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Rapid Elasticity?

A

Rapid provision. Scale IN / Scale OUT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Resource Pooling?

A

Resources pooled to server multiple customer, using multi-tenant model, filled from multiple locations

17
Q

What is Measured service Pay - As - You - Go?

A

Shared mechanisms, resource metering, capability, monitoring, controlled, reported