SE4455 Final (Unit 5-8) Flashcards
Name 4 cloud management mechanisms
remote admin system
resource management system
SLA management system
Billing management system
How does the remote admin system interface with underlying management systems?
Via APIs
What are the two types of remote admin system portals?
usage & administration
self-service
What does the usage & administration portal do?
centralized management controls of different cloud resources
Which remote admin portal provides IT resource usage reports?
Usage and admin portal
What does the self-service portal do?
shopping portal: allows consumers to search list of cloud services & resources
Why do remote admin systems use standard APIs?
- consumer can create own administration console and reuse it with multiple cloud providers
What does VIM stand for
Virtual Infrastructure manager
What does the VIM do?
manages multiple virtual resources and hypervisors across multiple physical servers
What is the name of the repository in a resource management system?
VM image repository
What does the VM image repository store?
Virtual resource templates to create pre-built instances (virtual server images)
Replication, load balancing, and failover systems are tasks performed by which cloud management system?
resource management system
What are the 2 forms of access for resource management system
- externally through a usage and administration portal
2. internally through the native user interface provided by VIM
What are the 2 components of the SLA management system?
SLA manager
quality-of-service measurements repository
What mechanisms are used to collect SLA data?
SLA monitors
SLA monitor agents intercept messages between who?
cloud consumer
cloud service
What are the 2 components of a billing management system?
pricing & contract manager
pay-per-use measurement repository
What does encryption help counter?
eavesdropping
malicious intermediary
insufficient authorization
overlapping trust boundaries
Symmetric key encryption is also known as ___
private/secret key encryption
Asymmetric key encryption is also known as ___
public key encryption
Which method of encryption is faster?
symmetric
What security does private key encryption offer?
integrity and non-repudiation (not confidentiality)
What security does public key encryption offer?
confidentiality only
What is the underlying encryption protocol for HTTP?
SSL and TLS