Securing the Cloud Terms (Ch. 6) Flashcards

1
Q

On-premise or cloud-based security policy enforcement points.

A

cloud access security broker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Moving the execution of an application to the cloud on an as-needed basis.

A

cloud bursting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources.

A

cloud computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cloud delivery model in which the infrastructure is shared by organizations with something in common.

A

community cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Any cloud delivery model that combines two or more of the other delivery model types.

A

hybrid cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The software that allows virtual machines to exist.

A

hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A model of cloud computing that utilizes virtualization; clients pay an outsourcer for the resources used.

A

Infrastructure as a Service (IaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An agency (formerly known as the National Bureau of Standards [NBS]) that has been involved in developing and supporting standards for the U.S. government for over 100 years.

A

National Institute of Standards and Technology (NIST)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A cloud service model wherein the consumer can deploy but does not manage or control any of the underlying cloud infrastructure.

A

Platform as a Service (PaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A cloud delivery model owned and managed internally.

A

private cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A cloud delivery model available to others.

A

public cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A collection of technologies that provide the ability to balance network traffic and prioritize workloads.

A

QoS (quality of service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Isolating applications to keep users of them from venturing to other data.

A

sandboxing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A subscription-based business model intended to be more cost effective than smaller individuals/corporations could ever achieve on their own. The consumer can use the provider’s applications, but they do not manage or control any of the underlying cloud infrastructure.

A

Security as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Virtualization method that is independent of an operating system and installed on “bare metal”

A

Type I hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Virtualization method that is dependent on the operating system, often called a “hosted hypervisor”

A

Type II hypervisor

17
Q

stores everything related to the user (wallpaper, folders, windows, and so on) remotely and client software locally simulates the user’s desktop environment and capabilities while running them on the host.

A

VDE A virtual desktop environment (VDE)

18
Q

is the process of running a user desktop inside a virtual machine that lives on a server in the datacenter. It enables fully personalized desktops for each user yet maintains centralized management and security.

A

VDI Virtual desktop infrastructure (VDI)

19
Q

Emulating one or more physical computers on the same host.

A

virtualization

20
Q

The act of breaking out of one virtual machine into one or more others on the same physical host.

A

VM escape

21
Q

Growth that occurs on a large number of virtual machines and requires resources—usually administration related—to keep up with.

A

VM sprawl