Virtualization and Cloud Security Flashcards
You are a server virtualization consultant. During a planning meeting with a client, the issue of virtual machine point-in-time snapshots comes up. You recommend careful use of snapshots because of the security ramifications. Which security problem is the most likely to occur when using snapshots?
Snapshots can consume a large amount of disk space.
Invoked snapshots will mean that the virtual machine is temporarily unavailable.
Invoked snapshots will have fewer patch updates than the currently running virtual machine.
Invoked snapshots will have fewer patch updates than the currently running virtual machine.
Reverting a running virtual machine to an older snapshot could mean going back to a point in time before critical patches or virus scanning updates were applied, thus rendering your virtual machine vulnerable
A private medical practice hires you to determine the feasibility of cloud computing, whereby storage of e-mail and medical applications, as well as patient information, would be hosted by a public cloud provider. You are asked to identify potential problems related to sensitive data regulatory compliance. (Choose two.)
Data is stored on the cloud provider’s infrastructure, which is shared by other cloud tenants.
HTTPS will be used to access remote services.
Should the provider be served a subpoena, the possibility of full data disclosure exists.
Data will be encrypted in transit as well as when stored.
Data is stored on the cloud provider’s infrastructure, which is shared by other cloud tenants.
Should the provider be served a subpoena, the possibility of full data disclosure exists.
Sharing the same cloud computing services with other customers could be forbidden by sensitive data regulations, although cloud tenant data is not accessible by other cloud tenants. Depending on the provider’s geographic location, different laws may apply to whether data hosted by the provider can legally be disclosed. However, that’s not a risk many organizations are willing to take
Which of the following are true regarding virtualization? (Choose two.)
Each virtual machine has one or more unique MAC addresses.
Virtual machine operating systems do not need to be patched.
Virtual machines running on the same physical host can belong to different VLANs.
A security compromise of one virtual machine means all virtual machines on the physical host are compromised.
Each virtual machine has one or more unique MAC addresses.
Virtual machines running on the same physical host can belong to different VLANs.
Each virtual machine does have one or more unique MAC addresses that are configurable by the virtual machine administrator. Virtual machines running on the same host can connect to different VLANs (physical or internal); this is a virtual network configuration setting
Cloud computing offers which benefits? (Choose two.)
Scalability
Fewer hardware purchases
Better encryption
Local data storage
No requirement for on-premises antivirus software
Scalability
Fewer hardware purchases
Scalability with cloud computing is possible because a third party (the cloud provider) pools and provides hardware, software, software licensing, and so on. Provisioning additional resources such as more storage on-demand is a characteristic of cloud computing. Because a third party is hosting some (or all) of your IT services, you will require fewer hardware resources on-premises
You are responsible for three IaaS payroll servers that store data in the cloud. The chief financial officer (CFO) requests observation of access to a group of budget files by a particular user. What should you do?
Create file hashes for each budget file.
Configure a HIDS to monitor the budget files.
Configure file system auditing for cloud storage.
Configure file system auditing for cloud storage.
You should configure file system auditing for budget file access by the employee in question. This enables you to track who accessed budget files at any given time
As the database administrator for your company, you are evaluating various public cloud offerings to test customer database app code changes. Which category of cloud service should you research?
Software as a Service
Platform as a Service
Infrastructure as a Service
Platform as a Service
Platform as a Service (PaaS) is primarily of interest to software developers and provides IT services over a network such as databases and programming APIs
Your company hosts an on-premises Microsoft Active Directory server to authenticate network users. Mailboxes and productivity applications for users are hosted in a public cloud. You have configured identity federation to enable locally authenticated users to connect to their mailboxes and productivity applications seamlessly. What type of cloud deployment model is in use?
Public
Private
Hybrid
Hybrid
Hybrid cloud solutions combine on-premises IT services with IT services hosted in the cloud
What type of hypervisor would be required if you wanted to use an existing server with an existing operating system?
Type 1
Type 2
Type 3
Type 2
Type 2 hypervisors run on top of an existing operating system
Your manager wants to run every application securely in its own virtualized environment while minimizing application startup time. What should be used for each application?
Virtual machine
VM escape protection
Application container
Application container
Application containers enable the deployment of each app in its own virtualized environment while minimizing app startup time, because the container uses the underlying host operating system that is already running
Which cloud computing characteristic relates to how a service can grow in response to workloads?
Scalability
Pulverizing
Templates
Scalability
Scalability is a cloud computing characteristic that enables resources to respond to workload changes, such as adding virtual machines (scaling out) when an application becomes busier. Scaling in (removing virtual machines) is also an option when demand declines, and it reduces cloud computing costs
You have replicated on-premises application servers and data to the cloud in the event of an on-premises network disruption. The servers are kept in sync through replication. Which term best describes the role of the cloud in this configuration?
Warm site
Hot site
Cold site
Hot site
With disaster recovery, hot alternative sites are mirrored with copies of IT systems and data from a primary site. Configurations and data are kept in sync via replication. Hot sites can be alternate facilities many miles away from the primary site. Public clouds are now commonly used as hot sites, which removes the cost of maintaining a separate facility
You have configured a cloud-based VDI solution in which client devices run a cloud-based Windows desktop. Which term best describes the connecting user device that may be generally used?
Thick client
Smartphone
Thin client
Thin client
A thin client is an end-user device with limited processing power and storage that connects to a powerful remote server to run operating systems and apps over a network
You are configuring cloud-based virtual networks without having to connect directly to the cloud provider hardware routers to configure VLANs. What enables this capability?
Software-defined networking
Transit gateway
Software-defined visibility
Software-defined networking
Software-defined networking (SDN) adds a configuration layer above network infrastructure hardware that enables a simplified and consistent management experience such as through a web GUI or command-line tools. SDN removes the need of cloud customers having detailed technical knowledge related to the configuration of underlying network hardware
Private cloud technicians have configured policies that will shut down and remove virtual machines with no activity for 30 days or more. What are technicians attempting to prevent?
VM escaping
VM resource policy exploitation
VM sprawl
VM sprawl
Because of the ease and speed in which virtual machines can be deployed in the cloud, over time VM sprawl may occur. In VM sprawl, you may not be aware of the existence of numerous virtual machines that are not used or that have been forgotten, yet they still exist and could remain running, thus incurring cloud computing charges
You must ensure that cloud storage is available in the event of a regional disruption. What should you configure?
Cloud storage permissions
Cloud storage replication within a data center
Cloud storage replication across zones
Cloud storage replication across zones
Replication of cloud-stored data to alternative physical locations, or geographical zones, provides data redundancy in the event of a disruption in one region