Section 13: Cloud Computing Flashcards

1
Q

Cloud computing

A

A way of offering on-demand services that extend the traditional capabilities of a computer or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

VDI

A

Virtual Desktop Infrastructure - VDI allows a cloud provider to offer a full desktop operating system to an end user from a centralized server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the four different cloud types?

A

Public

Private

Hybrid

Community

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Public Cloud

A

A service provider makes resources available to the end users over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Private Cloud

A

A company creates its own cloud environment that only it can utilize as an internal enterprise resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hybrid Cloud

A

Benefits of both public and private cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Community Cloud

A

Resources and costs are shared among several different organizations who have common service needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Saas

A

Software as a Service - Provides all the hardware, OS, software, and apps needed for a complete service to be delivered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IaaS

A

Infrastructure as a Service - Provides all the hardware, OS and backend software needed in order to develop you own software or service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PaaS

A

Platform - Provides your organization with the hardware and software needed for a specific service to operate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SecaaS

A

Security as a Service - Provides your organization with various types of security services without the need to maintain a cybersecurity staff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Sandboxing

A

Utilizes separate virtual networks to allow security professionals to test suspicious or malicious files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

File Servers

A

Servers are used to store, transfer, migrate, sync, and archive files for your organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

__________ are a frequent point of attack in cloud environments

A

Email servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Web Servers should be placed in your

A

DMZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

FTP Server

A

A specialized type of file server that is used to host files for distribution across the web

17
Q

Domain Controller

A

A server that acts as a central repository of all the user accounts and their associated passwords for the network

18
Q

Golden Ticket

A

Generates a ticket to allow access into the DC

19
Q

VPCs

A

Virtual Private Clouds - A private network segment made available to a single cloud consumer within a public cloud

20
Q

What two things do you need to consider when storing data in the cloud?

A

Compliance and regulatory considerations

21
Q

Serverless

A

A software architecture that runs functions within virtualized runtime containers in a cloud rather than on dedicated server instances

22
Q

Insecure API

A

Must always be used over an encrypted channel! All data must pass server-side validation routines! Error handling and error messages! Implement throttling/rate-limited mechanisms to protect from a DoS

23
Q

Improper Key Management. How do you mitigate this?

A

Use SAML, OAuth. OIDC for authentication

Do not hardcode or embed a key into the source code

Delete unnecessary keys and regenerate keys when moving into a production environment

Make sure you have hardening policies in place for all hosts, servers, etc.

24
Q

Insufficient Logging and Monitoring. Mitigating?

A

Software as a service may not supply access to log files or monitoring tools

Logs must be copied to non-elastic storage for long-term retention=

25
Q

Unprotected Storage mitigation

A

Cloud storage containers are referred to as buckets or blobs

Check your permissions; make sure they’re correct

Incorrect origin settings may occur when using content delivery

26
Q

Cross Origin Resource Sharing (CORS) Policy

A

A content delivery network policy that instructs the browser to treat requests from nominated domains as safe