S13-Cloud & Datacenter Flashcards

1
Q

What are some Benefits of Cloud Computing?

A
  • High Availability
  • Scalability
  • Elasticity
  • Metered Utilization
  • shared Resources
  • File Sync
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

High Availability

A

Service experience very little downtime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Scalability

A

Ability to expand a system at a linear rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Elasticity

A

Ability to quickly scale up or down in response to fluctuating demand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Metered Utilization

A

Being Charged for a service on a Pay per use Basis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Shared Resources

A

Ability to minimize the costs by putting VMs on other servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

File Sync

A

Ability to store data which can then spread to other places depending on config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

in terms of Scalability What are 2 ways you can scale?

A
  • Vertical Scaling (Scaling up)
  • Horizontal Scaling (Scale out)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Vertical Scaling

A

Increasing the power of existing resources in the working environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Horizontal Scaling

A

Adding additional resources to help handle the extra load

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is the Difference between a metered and Measured service?

A

Metered
- you are paying based on actual usage

Measured
- Paying for a certain amount of quantity upfront

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

On - Premise Solution

A

All necessary components to run an Organization’s cloud need to be acquired, installed and configured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hosted Solution

A

Third Party service provider, provides all the resources needed to maintain a cloud solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Multitenancy?

A

Hosted Solution provides service to several different orgs using the same hardware, but logically separates each.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some things to consider when choosing a Hosted Solution?

A
  • Authentication Mechanisms
  • Redundancy & Fault tolerance
  • Storage location and region legality
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the 3 main cloud service models?

A
  • Software as a Service (SaaS)
  • Platform as a Service (PaaS)
  • Infrastructure as a Service (IaaS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is SaaS?

A

“Software as a Service”

a cloud-based software delivery model where a provider hosts and manages applications, and users access them over the internet

  • Full solution w/ Hosted Application Software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are some SaaS examples?

A

Microsoft Office 365, Goggle Drive, Turbo Tax, Dropbox, Netflix etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is PaaS?

A

“Platform as a Service”

provides a ready-to-use platform for developing, deploying, and managing applications.

  • Hardware Infrastructure solution
  • Infrastructure Software Solution (Middleware, Runtime, OS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

PaaS Examples

A

AWS, Azure App Service, Google Cloud Platform (GCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what is IaaS?

A

“Infrastructure as a Service”

a cloud computing model where a third-party provides on-demand access to virtualized infrastructure, including compute, storage, and networking resources

  • Hardware focused Infrastructure solution
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

IaaS Examples

A

Microsoft Azure Machines, Google Compute Engine, AWS EC2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the 6 types of Cloud Deployment Models?

A
  • Public
  • Private
  • Hybrid
  • Community
  • Multi-Tenancy
  • Single-Tenancy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Public

A

Service Provider makes resources available to end users over the internet
Eg. Google Drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Private

A

a cloud computing environment exclusively used by a single organization
Eg. AWS GovCloud (US)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Hybrid

A

Combination of private and Public clouds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Single-Tenancy

A

Assigns a particular resource to a single Organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Community

A

Collaborative infrastructure shared between several organizations with common service needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Multi-Tenancy

A

Allows Customers to share computing resources in a public or private cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Virtual Private Network (VPN)

A

an encrypted connection over the internet from a device to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is a Private-Direct Connection?

A

establishes a dedicated, secure link between a user’s network and a cloud service provider’s data center, bypassing the public internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Why a Private direct Connection over a VPN?

A

Private direct offers faster speeds & better performance
- Multiple VPCs
- Better Redundancy
- Higher cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What Components make up cloud security?

33
Q

What is a VPC?

A

“Virtual Private Cloud”

A private cloud environment built on top of a public cloud infrastructure.

34
Q

What is IAC?

A

“Infrastructure as Code”

the practice of managing and provisioning IT infrastructure by using computer code instead of manual configuration or manual steps.

35
Q

What are some features and core components of VPC?

A
  • Subnets
  • Route Tables
  • Internet Gateways
  • Network Address Translation Gateways
  • Network access Control lists
  • Security Groups
  • VPC Peering
  • VPC Endpoints
  • VPN connections
36
Q

Subnet (Vpc)

A

logical network segment that divides the VPC into smaller, isolated networks. can have Public and Private subnets

37
Q

Route Table

A

Contains a set of rules (routes), that determine where network traffic is directed within the VPC network

38
Q

Internet Gateway

A

a horizontally scaled, redundant, and highly available VPC component that allows communication between your Virtual Private Cloud (VPC) and the public internet

39
Q

Network Address Translation (NAT) Gateway

A

a managed service that enables instances in private subnets to connect to the internet by translating the private IP addresses of these instances to a public IP address,

40
Q

Network Access Control List (ACL)

A

VPC Feature that acts as a firewall, controlling traffic in and out of one or more subnets

41
Q

How does a Network ACL behave?

A

Like a stateless firewall:
examines each network packet independently, without maintaining a record of previous connections.

42
Q

Security Groups

A

an instance level, virtual stateful firewall that controls inbound and outbound traffic for resources within a VPC

43
Q

How does a Security Group behave?

A

Like a Stateful Firewall:
monitors and tracks the state of ongoing network connections to make decisions about which packets to allow through

44
Q

VPC Peering

A

A networking connection between 2 VPCs that enables routing traffic between them privately

45
Q

VPC Endpoints

A

virtual devices that provide secure, private connectivity between resources within a Virtual Private Cloud (VPC) and specific AWS services, without requiring public IP addresses or traversing the internet.

46
Q

What are some VPC advantages?

A
  • Mixing Products from different Vendor
  • Faster network development
  • Automation and Policy Management
47
Q

Network Function Virtualization (NFV)

A

a networking approach that virtualizes network functions (like firewalls or load balancers) instead of relying on dedicated hardware appliances

48
Q

What 3 main components are needed for NFV?

A
  • NFV Infrastructure
  • Management and Network Orchestration
  • Virtual Network Functions
49
Q

NFV Infrastructure

A

All the hardware and virtual resources needed for deploying, managing, and executing VNFs

50
Q

Management and network Orchestration (MANO)

A

Oversees the lifecycle management of the VNFs, and orchestrates the resources across the NFVI

51
Q

Virtual Network Functions (VNFs)

A

Software implementations of network functions previously bound to hardware devices.

52
Q

What are the advantages of NFV?

A
  • Flexibility and Rapid deployments
  • Cost efficiency
53
Q

NFV drawbacks

A
  • Need for security
  • Complex
  • Installation
54
Q

Software Defined Network (SDN)

A

Networking that uses software-based controllers or APIs to communicate with underlying hardware infrastructure and direct traffic on a network

55
Q

What are the 3 parts of a typical network architecture?

A
  • Control Plane
  • Data Plane
  • Management Plane
56
Q

Control Plane

A

Carries the traffic that provides the signals to an from a router. Decides traffic priority and how its secured
- Decides where data goes

57
Q

Data Plane

A

(Forwarding plane) Carries user traffic on the network
- Moves the Data

58
Q

Management Plane

A

Administers the routers and switches inside the network and monitors traffic conditions and the status of the network

59
Q

Advantages of an SDN

A
  • Flexibility
  • Speed and Agility
  • Automation
  • Security
60
Q

SDN Drawbacks

A
  • Single Point of failure
  • High Vulnerability
61
Q

What are the 3 main types of SDNs?

A
  • Open SDN
  • Hybrid SDN
  • SDN Overlay
62
Q

Open SDN

A

SDN that relies on open-source technology

63
Q

Hybrid SDN

A

Network that employs traditional SN protocols to operate itself

64
Q

SDN Overlay

A

a virtual network built on top of an existing physical network infrastructure,

65
Q

Software-Defined Wide Area Network (SD-WAN)

A

Virtually optimizing WAN connections to efficiently route traffic between remote sites, data centers, and cloud environments
- Software based WAN architecture

66
Q

Virtual Extensible Local Area Network (VXLAN)

A

Network Virtualization technology that addresses the limitations posed by traditional network infrastructures

67
Q

How does a VXLAN work

A

Encapsulates L2 Ethernet frames within Layer 3 UDP packets

68
Q

What is included in a VXLAN packet?

A
  • 24-bit VXLAN Network Identifier (VNI)
69
Q

How many Identifiers can VXLAN support?

A
  • 16 million +
70
Q

What are the 2 primary VXLAN components?

A
  • VXLAN Tunnel End Points
  • VXLAN Segments
71
Q

VXLAN Tunnel End Points (VTEPs)

A

Encapsulates and de-encapsulates Ethernet frames into VXLAN packets

72
Q

VXLAN segments

A

Layer 2 network overlaid onto a Layer 3 network that is then identified by a unique 24-bit VNI

73
Q

VXLAN Benefits

A
  • Scalability (supports 16 mil V-networks)
  • Flexibility (extend L2 networks across different data centers and clouds)
  • Improved Utilization (Optimizes traffic flows)
74
Q

VXLAN Drawbacks

A
  • Complex
  • Latency
  • Configuration
75
Q

Secure Access Secure Edge (SASE)

A

a cloud-based framework that combines network and security functions into a single service.

76
Q

Security Service Edge (SSE)

A

Subset of SASE that focuses on Security services to protect access between users, devices, and the cloud

77
Q

Secure Web Gateway (SWG)

A

Used to inspect and filter unwanted Software and Malware from user-initiated web and internet traffic.

78
Q

Cloud Access Security Broker (CASB)

A

Border device between cloud service consumers and providers to monitor activity and enforce security Policies

79
Q

Zero Trust Network Access (ZTNA)

A

Designed on the principle that trust is not a default for any user or device, inside or outside the organization’s network