SE4455 Midterm Flashcards

1
Q

How much do we have to do for capstone?

A

Everything - we are not in good shape!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Network Cloud?

A

Delivery method of data across heterogenous public and semi-public networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Gartner definition of cloud?

A

scalable and elastic IT enabled capabilities that are delivered as a service to external customers using internet technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the NIST definition of cloud?

A

Too long to put in the cards :p

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Two types of motivations for cloud?

A

Business and technology drivers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

3 types of business drivers?

A
  1. Capacity Planning
  2. Cost Reduction
  3. Organizational Agility
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

8 types of technology drivers?

A
  1. Clustering
  2. Grind Computing
  3. Virtualization
  4. Broadband networks / internet architecture
  5. Data centre technology
  6. Web technology
  7. Multitenant technology
  8. Service technology
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is capacity planning ? (and list 3 strategies)

A

Focused on minimizing the discrepancy between capacity and demand of an IT resource

  1. Lead strategy
  2. Lag strategy
  3. Match strategy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a lead capacity planning strategy?

A

adding capacity in anticipation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a lag capacity planning strategy?

A

adding capacity after a resource reaches full capacity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a match capacity planning strategy?

A

adding capacity in small increments as demand increases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Two types of cost reduction methods?

A
  1. Cost of acquiring new infrastructure

2. Cost of ongoing ownership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 3 main aspects to organizational agility?

A

(Highlighted red on the organizational agility slide)

  1. Adapt and evolve
  2. Scaling IT resources
  3. Changing business needs and priorities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Clustering?

A
  • Group of independent IT resources acting as a single system
  • Reduced failure rates, increased reliability / availability
  • synchronized through high speed communication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Grid computing?

A
  • Organized resources into one or more logical poolss
  • Loosely coupled and distributed systems
  • Heterogeneous and geographically disbursed computer resources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Virtualization?

A
  • Physical resources providing multiple virtual images of themselves to share underlying process capabilities
  • Hardware requirements simulated through emulation
  • Severs software-hardware dependency
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Jeff Jeff Jeff Jeff

A

What is San Francisco?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Basic concepts definition of Cloud

A

A distinct IT environment designed for remotely provisioning scalable and measurable IT resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the different IT resources?

A
  • Physical server
  • Virtual server
  • Software program
  • Service
  • Storage Device
  • Network Device
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are on premise IT resources?

A
  • Not cloud based
  • Can access, interact, or be moved to cloud
  • Redundant deployments can exist
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a cloud consumer?

A

someone who consumes clouds ;)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a cloud provider?

A

someone who provides clouds ;)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are two types of scalability?

A
  1. Horizontal scalability

2. Vertical scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the aspects of horizontal scalability?

A
  • less expensive
  • instantly available
  • replication and automation
  • additional IT resources needed
  • NOT limited by hardware capacity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are the aspects of vertical scalability?

A
  • more expensive
  • normally instantly available
  • additional set up needed
  • NO additional IT resources needed
  • limited by hardware capacity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is a cloud service?

A

IT resources made available by cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What does SLA stand for?

A

Service Level Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is a Service Level Agreement

A
  • Describes QoS features: availability, reliability, performance
  • IT outcomes: uptime and security characteristics
  • SLA is a critical specification
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What can be a cloud service consumer?

A
  • Software program
  • Service
  • Workstation
  • Laptop
  • Cellphone
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are the three main benefits of cloud computing?

A
  1. Reduced investment and proportional cost
  2. Increased scalability
  3. Increased availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What are the 4 main risks and challenges?

A
  1. Security vulnerabilities
  2. Operational governance
  3. Limited portability between cloud providers
  4. Multi-regional compliance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is a Cloud Resource Administrator?

A
  • Administers cloud based resources
  • Can be consumer, provider, or third party
  • NOT a cloud service administrator
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is a Cloud Auditor?

A

Evaluates security controls, privacy and performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is a Cloud Broker?

A

Manages the negotiating of cloud services between providers and consumers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is a Cloud Carrier?

A
  • Provides wire-level connectivity between consumers and providers
  • Usually network/telecom providers (e.g. Rogers)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What are the two cloud boundaries?

A
  1. Organizational Boundary

2. Trust Boundary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is ubiquitous access?

A

Widely accessible cloud services tailors to specific cloud needs of consumer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is Multitenancy ?

A
  • Characteristics that allow the instance of the program to service different consumers
  • Relies on virtualization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is resource pooling?

A

Allows providers to pool large scale IT resources to serve multiple cloud consumers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is cloud elasticity?

A

Transparently scale IT resources in response to runtime or pre-determined conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is Measured usage?

A

The ability of a cloud platform to keep track of IT resource usage / usage reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is resiliency?

A

Form of failover that distributes redundant implementations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What are the 3 main cloud delivery models?

A
  1. Infrastructure-as-a-Service (IaaS)
  2. Platform-as-a-Service (PaaS)
  3. Software-as-a-Service (SaaS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Which cloud delivery model has full administrative control?

A

Infrastructure-as-a-Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Which cloud delivery model has the most limited administrative control?

A

Software-as-a-Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Which cloud delivery model has only usage-related configuration controls?

A

Software-as-a-Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

There are also other specialized delivery models

A

Storage, database, security, communication, integration, testing, process (all as services)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What are the 6 cloud deployment models?

A
  1. Public Cloud
  2. Community Cloud
  3. Private Cloud
  4. Hybrid Cloud
  5. Virtual Private Cloud
  6. Inter-Cloud
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Owned by community members or third party, and limited to a specific community is what type of cloud deployment model?

A

Community cloud deployment model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

A self contained cloud environment, managed by a public cloud provider, is what type of cloud deployment model?

A

Virtual cloud deployment model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

A cloud comprised of two or more inter-connected clouds is what type of cloud deployment model?

A

Inter-cloud deployment model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

A cloud offered to consumers at cost or advertisement is what type of cloud deployment model?

A

Public cloud deployment model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

A complex and challenging cloud due to potential disparity is what type of cloud deployment model?

A

Hybrid cloud deployment model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

A cloud owned by a single organization is what type of cloud deployment model?

A

Private cloud deployment model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What is an ISP

A

Internet Service Provider

-Hierarchical topology composed of Tiers 1,2,3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What are 3 main technical and business considerations?

A
  1. connectivity issues
  2. network bandwidth latency issues
  3. cloud carrier and cloud provider selection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Why do you group IT resources in close proximity? (3 reasons)

A
  1. power sharing
  2. higher efficiency
  3. improved accessibility
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Here is just a list of data centre characteristics to read over:

A
  • virtualization
  • standardization/modularity
  • automation
  • remote operation / management
  • high availability
  • security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What are the main data centre components?

A
  1. Facilities
  2. Computing Hardware
  3. Storage Hardware
  4. Networked Storage
  5. Network Hardware
60
Q

Classify the hardware under each type of data centre component: Rackmount servers, processing architecture, hot swaps

A

Computing Hardware

61
Q

Classify the hardware under each type of data centre component: SAN and NAS

A

Networked Storage

62
Q

What is SAN?

A
  • Storage Area Network

- Multiple storage devices connected through LAN network

63
Q

What is NAS?

A
  • Network Attached Storage

- Array of storages connected through NAS device and have access to the network

64
Q

Classify the hardware under each type of data centre component: Hard disk array, I/O caching, hot swaps, virtualized storage

A

Storage Hardware

65
Q

Classify the hardware under each type of data centre component: LAN / SAN fabric, NAS gateway, Web-tier load balancing, carrier and external network interconnection

A

Network Hardware

66
Q

What is virtualization technology?

A

converting physical IT resources into virtual IT resources

67
Q

T/F: Servers, Storage, Network, and Power are all resources that can be virtualized

A

True

68
Q

What are the 4 main parties involved with virtualization (concepts slide)

A
  1. Physical Host - Virtualized Server
  2. Host Operating System - Virtualized server OS
  3. Guest operating system - virtual machine OS
  4. Hypervisor (virtual machine manager) - virtual server and host physical resources manager
69
Q

3 main characteristics of virtualization?

A
  1. Hardware independence
  2. Server consolidation
  3. Resource replication
70
Q

What is another name for hardware-based virtualization?

A

Hypervisor

71
Q

What are 3 concerns with virtualization?

A
  1. performance overhead
  2. special hardware compatibility
  3. portability
72
Q

What are web technology resources?

A

Artifacts accessible via world wide web

73
Q

What is the World Wide Web?

A

System of interlinked IT resources accesses through internet

74
Q

List two BASIC components of world wide web:

A
  1. Web browser client
  2. Web server

(other components also include proxies, caching services, gateways, load balancers)

75
Q

What is a URL

A
  • Uniform Resource Locator

- identifier for web-based resorces

76
Q

What is HTTP

A
  • Hypertext transfer protocol

- primary communications protocol for the internet

77
Q

What are the two main markup languages?

A
  1. HTML - expresses presentation

2. XML - defines vocabularies associated with web-based data via metadata

78
Q

What is a web application?

A
  • distributed application using web-based technologies

- supports almost all cloud-based environments

79
Q

T/F: presentation layer is client side

A

True

80
Q

T/F: application layer is client side

A

False; application layer is server side

81
Q

T/F: Data layer is server side

A

True

82
Q

Fun Fact:

A

Presentation Layer
Application Layer
Data Layer

Are all web application layers

83
Q

What is multitenant technology

A
  • enables multiple users (tenants) to access the same application logic simultaneously
  • only have access to their own view/data
84
Q

There are 7 characteristics of multitenant applications:

A
  1. usage isolation
  2. data security
  3. recovery
  4. application upgrades
  5. scalability
  6. metered usage
  7. data tier isolation
85
Q

What is the difference between virtualization and multitenancy?

A

virtualization has multiple virtual copies (each provided to client) of environment hosted by single physical server

compared to

multitenancy having physical or virtual serves hosting an application designed to allow multiple users on the same application with usage exclusivity

86
Q

What is a SOAP based web service?

A
  • Simple Object Access Protocol (SOAP)

- common messaging format for request and response messages

87
Q

T/F: Web Service Description Language (WSDL) is a SOAP based web service?

A

True

88
Q

T/F: XML Schema Definition Language is a REST based web service?

A

False; XML Schema is a SOAP based web service

89
Q

What is UDDI?

A
  • Universal Description Discovery and Integration

- regulates service registries in which WSDL definitions can be published

90
Q

What is a REST API?

A
  • Representational State Transfer

- set of recommendations for designing loosely coupled applications using HTTP protocol

91
Q

What is the difference between SOAP and REST?

A

REST allows developers to implement details according to their own needs

92
Q

What are Service agents?

A

Event driven programs for intercepting messages at runtime

93
Q

What are the two types of service agents?

A

Active - actions upon intercepting and reading require making changes to message contents

Passive - don’t change message content, my capture contents for monitoring

94
Q

What is service middleware?

A

Platform designed to accommodate complex service compositions

95
Q

What are the two types of service middleware?

A
  1. Enterprise Service Bus (ESB) - intermediary processing features (routing, queuing, broker)
  2. Orchestration Platform (OP) - hosts / executes workflow logic for runtime composition
96
Q

Define confidentiality in terms of a cloud security concept

A

Something made accessible only to authorized parties

a message is considered confidential if it is not accessed or read by any unauthorized party

97
Q

Define integrity in terms of a cloud security concept

A

Something not having been altered by an unauthorized party

data transmitted matches data received

98
Q

Define authenticity in terms of a cloud security concept

A

Something having been provided by an authorized source

99
Q

Define availability in terms of a cloud security concept

A

Something being accessible and usable at any specific time

responsibility is shared by cloud consumers and providers

100
Q

Define threat in terms of a cloud security concept

A

A potential security violation in attempt to breach privacy / cause harm

(threats can be automatic or manual)

101
Q

Define vulnerability in terms of a cloud security concept

A

Weakness that can be exploited due to:

  • insufficient security controls
  • existing security is overcome by an attack
102
Q

List the 6 main cloud vulnerabilities

A
  1. configuration deficiency
  2. security policy weakness
  3. user error
  4. hardware / firmware flaws
  5. software bugs
  6. poor security
103
Q

What are security controls?

A

Countermeasures used to prevent security threats and reduce risk

104
Q

What are two security mechanisms?

A
  1. defensive frameworks

2. countermeasures

105
Q

What is a threat agent?

A

An entity that poses a threat because it’s capable of an attack

106
Q

What are the 4 main threat agents?

A
  1. Anonymous attacker
  2. Malicious Service Agent
  3. Trusted Attacker
  4. Malicious Insider
107
Q

Based on the description what type of threat agent is this: Human threat agent acting on behalf of a cloud provider

A

Malicious Insider

108
Q

Based on the description what type of threat agent is this: Non-trusted cloud service consumer without permission in the cloud

A

Anonymous Attacker

109
Q

Based on the description what type of threat agent is this: Able to intercept and forward network traffic that flows within a cloud; external program able to remotely intercept messages

A

Malicious Service Agent

110
Q

Based on the description what type of threat agent is this: Shares IT resources in same cloud as the consumer and exploits legitimate credentials targeting cloud providers and tenants

A

Trusted Attacker

111
Q

What is traffic eavesdropping?

A

Data is passively intercepted by malicious service agents; compromises confidentiality

112
Q

What is a malicious intermediary?

A

Intercepts messages and alters them with harm data that compromises both confidentiality and integrity of the message

113
Q

What is a DoS?

A
  • Denial of service

- overloads resources to the point of the cloud not being able to function properly

114
Q

What is insufficient authorization?

A

Access is granted to attackers too broadly, leads to attackers gaining direct access to resources

115
Q

What is a virtualization attack?

A

Exploits vulnerability in virtualization platform; jeopardizes confidentiality, integrity, availability, and the underlying physical infrastructure

116
Q

How are overlapping trust boundaries a cloud security threat?

A

Malicious consumers target shared resources and compromise other cloud consumers or other IT resources with the same trust boundary

117
Q

What is security policy disparity?

A

IT resources may not be identical between consumers and providers

118
Q

Risks are quantified and qualified based on what two main aspects?

A
  1. Probability of occurrence

2. Degree of impact

119
Q

What is a logical network perimeter?

A

isolation of a network environment from the rest of a network

120
Q

what are the objectives of a logical network perimeter?

A
  1. isolate non-authorized users
  2. isolate non-users
  3. isolate cloud consumers
  4. control available bandwidth
121
Q

How are logical network perimeters deployed?

A
  • deployed as virtualized IT environment
  • things like virtual firewalls to filter network traffic
  • things like VLANs to isolate network environment within a data center
122
Q

What is the most foundational building block of a cloud environment?

A

Virtual server

123
Q

What is a virtual server?

A

share same physical server with multiple cloud consumers by hosting numerous IT resources provided for individuals

124
Q

What type of software controls a virtual server?

A

Hyperviser

125
Q

What is a cloud storage device?

A
  • virtualized storage designed for cloud-based provisioning

- provides fixed increment capacity allocation in support of pay-per-use mechanism

126
Q

What are the concerns of cloud storage?

A

security, integrity, confidentiality, performance

127
Q

What are the 4 cloud storage levels?

A
  1. Files
  2. Blocks
  3. Datasets
  4. Objects
128
Q

Classify the description as a cloud storage level: sets of data organized into table-based formats

A

Datasets

129
Q

Classify the description as a cloud storage level: data and metadata organized as web-based

A

Objects

130
Q

Classify the description as a cloud storage level: lowest level of storage; smallest unit of data still individually accessible

A

Blocks

131
Q

Classify the description as a cloud storage level: collections of data that are grouped

A

Files

132
Q

What are the two network storage interfaces?

A
  1. Storage blocks - fixed format, closest to hardware

2. File and network storage

133
Q

T/F: Server message block (SMB) and Small computer system interface (SCSI) are part of the storage blocks network storage interface

A

True

134
Q

T/F: Common internet file system (CIFS) and Network file system (NFS) are part of the storage blocks network storage interface

A

False; CIFS and NFS are part of the File and network storage interfaces

135
Q

T/F: Object storage interfaces are web resources

A

True

136
Q

T/F: Object storage interfaces are accessed via SOAP or web services using HTTP

A

False; Object storage interfaces are accessed via REST or web services using HTTP

137
Q

T/F: Storage networking industry association’s cloud data management interface (SNIA’s CDMI) does NOT support object storage interfaces

A

False; SNIA’s CDMI supports object storage interfaces

138
Q

What are the two main categories of database storage interfaces?

A
  1. Relational data storage

2. Non-relational data storage

139
Q

What is relational data storage?

A
  • Uses structured query language (SQL)
  • relies on tables to organize data
  • protection against integrity and redundancy
140
Q

what are 2 challenges of relational data storage?

A
  1. vertical scaling

2. performance

141
Q

What is non-relational data storage?

A
  • avoids complexity and overhead of relational storage
  • No normalization
  • more horizontally scalable than relational
  • data loses native form
142
Q

What is a cloud usage monitor?

A

Lightweight and autonomous software responsible for collecting / processing IT resource usage data

143
Q

What are the 3 main usage monitors?

A
  1. Monitoring agent
  2. Resource agent
  3. Polling agent
144
Q

Classify the usage monitor based on the following description: monitors usage based on pre-defined events at the resource software level including: initiating, suspending, resuming, or vertical scaling

A

Resource Agent

145
Q

Classify the usage monitor based on the following description: Event driven program that monitors and analyzes data flow measuring network traffic and message metrics

A

Monitoring Agent

146
Q

Classify the usage monitor based on the following description: Processing module that collects cloud service usage data on select IT resources; periodically monitors IT resource status, and uptime / downtime

A

Polling Agent

147
Q

And the grand finally:

You mom is?

A

YOUR DAD!