virtual and cloud computing Flashcards

1
Q

After establishing a free account online, users can use a cloud-based mapping software for free. What type of cloud service is the mapping software an example of?

A

Public cloud

A public (or multitenant) cloud is a service offered over the internet b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What would be a reason an organization would require a private cloud service? (Select all that apply.)

A

A cloud architecture is maintained and managed within an enterprise data center.

Organizations can exercise greater control over the privacy and security of their services.

A private cloud is an entirely private cloud infrastructure owned by the

Private cloud service allows the organization to exercise greater control over their services’ privacy and security, keeping sensitive or regulated infrastructure, applications, and data on-premises.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Multiple companies working together on a contract for an extended time decide that resources in a single cloud platform would work best during the project’s duration. What cloud type do the companies utilize?

A

Community cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An organization moves its sales and marketing operations to the cloud. Unlike the organization’s website, these systems are for internal use only. On what type of cloud model does the sales and marketing system operate?

A

Private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What cloud service type does a company subscribe to when there is a need for a backend database server for an online application?

A

Platform as a service (PaaS)

Platform as a service (PaaS) provides resources between SaaS and IaaS. A typical PaaS solution deploys servers and storage network infrastructure (as per IaaS) and provides a multi-tier web application/database platform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Users at an organization would like to have access to their work data when not connected to the internet. What type of service should IT configure for the users?

A

File synchronization

File synchronization allows users to have a mirrored copy of their data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An engineer decommissions an on-premises email server as all email functionality is now a cloud subscription service. What type of cloud service does the email utilize?

A

Software as a service (SaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An organization uses a private cloud service most of the year but only needs a higher utilization service several times a year when they have a symposium and many people worldwide attend. What is the best cloud service model for this use?

A

A hybrid cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A cloud service provides a billing dashboard that reports a virtual machine’s uptime, disk usage, and network bandwidth consumption. What characteristic does this demonstrate?

A

Metered utilization

The per-use billing for resources consumed by the cloud is known as mete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A manufacturer sells home repair goods through its online portal. Sales often skyrocket when demand is high due to storms and other phenomena. Due to the unpredictable nature of sales, what service does the manufacturer have in place to handle changing service levels?

A

Rapid elasticity

Rapid elasticity refers to the system’s ability to handle changes to dem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

High availability

A

is a requirement for short periods of downtime, typically due to planned maintenance and unscheduled outages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Scalability

A

is the cost of supplying the cloud services based on the number of users receiving the service. The benefit for an organization is it can scale up or down services based on the need.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A company has contracted a remote data center to offer exclusive access to the platform as a service resource to its internal business users. How would such a cloud solution be classed?

A

As a private deployment model

Private is a cloud infrastructure that is completely private to and owned by the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The company administrator wants to provision IT resources, such as servers, load balancers, and storage area network (SAN) components, to deploy when they need them rather than purchase these components separately. Which service model would be best?

A

IaaS

Infrastructure as a service (IaaS) is a means of provisioning IT resourc

such as servers, load balancers, and storage area network (SAN) components, quickly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In a virtual desktop infrastructure, what client functionality does a server handle? (Select all that apply.)

A

Data storage

Application processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of cloud service does a company establish for its employees only?

A

Private cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The Chief Information Officer (CIO) of an organization signs a contract with a cloud vendor. The vendor promises to maintain a level of service equal to Five Nines. What does the vendor offer to fulfill this promise?

A

High availability

18
Q

A company deploys a new cloud service for its customers and its salespeople. Depending on the login access, users of the service will either shift to a resource center internal to the organization or to a forum where customers can freely collaborate. What cloud model does the company deploy?

A

Hybrid cloud

19
Q

Multiple host servers exist on-premise and in the cloud for a manufacturing company. Users receive a warning that files are not saved during log-off when using a computer session hosted by these servers. What type of service does the manufacturing company use?

A

DaaS

Provisioning a virtual desktop infrastructure (VDI) as a cloud service i

20
Q

A web hosting company is home to many company websites. The model is such that a single server can host roughly five small low-traffic websites without changing the configuration. What service type does the web hosting company offer with these sites?

A

Shared resources

21
Q

When users connect to the network, they use a basic hardware terminal to access a desktop hosted on a server. What structure is the user deploying?

A

VDI

Virtual desktop infrastructure (VDI) refers to the use of virtual machin

22
Q

An IT administrator at a large company receives an alert that disk usage for a cloud-based service is over an established data transfer quota. Which service does the company utilize that triggers such an alert?

A

Metered utilization

The end-user is interested in and pays for only the services provided by

23
Q

An engineer is deploying a client-side virtualization workstation. What resource requirements should the engineer consider? (Select all that apply.)

A

CPU and virtualization extensions

Networking

Most virtualization software requires a central processing unit (CPU) with virtualization support enabled. Even if there is no formal requirement, the VMs will be impaired if hardware-assisted virtualization is unavailable.

A hypervisor will create a virtual network environment through which all the virtual machines (VMs) can communicate and has a network shared by the host and by VMs on the same host and other hosts.

24
Q

A cyber engineer has isolated malware and wants to analyze it. What is the value of using a sandbox?

A

It provides a controlled working environment.

25
Q

A technician is evaluating the security requirements associated with virtualization. What tenets apply to security requirement considerations? (Select all that apply.)

A

Each guest OS must be patched and protected against malware like any other OS.

The host must be protected from natural (loss of power) and technological (virus) influences.

The hypervisor must also be monitored for security vulnerabilities and exploits.

26
Q

A cyber architect reviews the differences between resource and security requirements associated with virtualization. What should the architect consider regarding resource requirements? (Select all that apply.)

A

The amount of memory required by the host/hypervisor.

The amount of available disk space.

The ability to create a virtual network environment.

27
Q

A system administrator manages a production network with various operating systems. What would allow for testing the operating system and application patches on multiple operating systems to ensure the production network does not experience adverse effects?

A

Cross-platform virtualization

28
Q

An organization with limited resources would like to upgrade its small network to increase its security. However, the organization requires a few legacy applications running on two older, none-supported operating systems. With only one desktop to spare, what solution would meet the organization’s needs?

A

Client-side virtualization

Client-side virtualization, typically based on a guest operating system hypervisor, is designed to run on regular desktops and workstations while supporting legacy software and operating systems.

29
Q

A lab technician is reviewing the various resource requirements associated with virtualization. What is NOT considered a resource requirement?

A

Hypervisor security

Hypervisor security is not considered a resource. Apart from ensuring the security of each guest operating system (OS) and the host machine itself, they must also monitor the hypervisor for security vulnerabilities and exploits.

30
Q

A cyber team is developing a client-side virtualization environment for third-party contracted employees. What action does the team complete using a VM and guest OS hypervisor to ensure the environment is functioning correctly?

A

Testing and development

Testing and development typically use a virtual desktop platform with a guest OS hypervisor. This ensures it is working as expected.

31
Q

A technician is reviewing the various aspects of virtualization. What type of virtualization enables programmers to ensure that the application continuously updates with the latest code?

A

Application virtualization

32
Q

When planning to deploy a client-side virtualization solution for malware analysis where no network connectivity is needed, what are some of the issues that a technician must consider? (Select all that apply.)

A

The resource requirements

The security requirements

33
Q

Cross-platform virtualization is a lab and testing environment that provides a solution to test software and applications under development with different operating systems, and what else?

A

Resource constraints

Cross-platform virtualization is a lab and testing environment that provides a means to test software and applications under different resource constraints and operating systems.

34
Q

A technician is reviewing policy on security requirements associated with virtualization. What could the technician consider as part of the security requirements? (Select all that apply.)

A

Host security

Hypervisor security

35
Q

An information security technician manages a secure and isolated network. Security is the primary concern on the isolated network, so it requires regular data transfers over optical compact disks due to network separation requirements. With the needed data and antivirus patch testing for malware detection, what solution would best fit this situation?

A

sandbox

36
Q

A cyber consultant is evaluating the various security requirements associated with virtualization. What is NOT considered a security requirement?

A

Legacy software/OS

37
Q

Some software applications may not work with the new operating system (OS) when host computers require an upgrade. In manufacturing environments, no longer supported applications are often needed to maintain production. However, due to security requirements, upgrades are necessary. What virtualization benefit offers a workaround?

A

Support for legacy software and OSs.

38
Q

What technology increases network security requirements while providing support for legacy software and operating systems?

A

Virtualization

39
Q

A cyber architect explores the capabilities, testing, and use of virtualization. What is a benefit associated with cross-platform virtualization?

A

It tests software applications under various constraints.

40
Q

An upcoming project will require a system administrator to deploy a client-side virtualization workstation. What resource requirements must the system administrator identify for the hypervisor and of each guest before installation? (Select all that apply.)

A

CPU

System memory

Mass Storage

41
Q

Cross-platform virtualization can create a lab and testing environment to test software and applications that require what?

A

Different operating systems

42
Q

It is not out of the ordinary to require multiple operating systems in most corporate environments. What virtualization type can provide a testing or lab atmosphere that offers a means to test software and applications that require different resource constraints and operating systems?

A

Cross-platform