Securing the Cloud Flashcards

1
Q

In which cloud service model can the consumer “provision” and “deploy and run”?

SaaS

PaaS

IaaS

A

IaaS

In the Infrastructure as a Service (IaaS) model, the consumer can “provision” and is able to “deploy and run,” but they still do not “manage or control” the underlying cloud infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which cloud delivery model is implemented by a single organization, enabling it to be implemented behind a firewall?

Private

Public

Community

A

Private

A private cloud delivery model is implemented by a single organization, and it can be implemented behind a firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which cloud service model provides the consumer with the infrastructure to create applications and host them?

SaaS

PaaS

IaaS

A

PaaS

In the Platform as a Service (PaaS) model, the consumer has the ability to create applications and host them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which cloud delivery model could be considered a pool of services and resources delivered across the Internet by a cloud provider?

Private

Public

Community

A

Public

A public delivery model could be considered a pool of services and resources delivered across the Internet by a cloud provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which cloud service model gives the consumer the ability to use applications provided by the cloud provider over the Internet?

SaaS

PaaS

IaaS

A

SaaS

In the Software as a Service (SaaS) model, the consumer has the ability to use applications provided by the cloud provider over the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which cloud delivery model has an infrastructure shared by several organizations with shared interests and common IT needs?

Private

Public

Community

A

Community

A community delivery model has an infrastructure shared by several organizations with shared interests and common IT needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which cloud delivery model could be considered an amalgamation of other types of delivery models?

Public

Community

Hybrid

A

Hybrid

The hybrid delivery model can be considered an amalgamation of other types of delivery models

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

With which of the following subscription-based models is security more cost effective than individuals or smaller corporations could ever get on their own?

SECaaS

PaaS

XaaS

A

SECaaS

Security as a Service (SECaaS) is a subscription-based business model intended to be more cost effective than smaller individuals/corporations could ever get on their own

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following are on-premise or cloud-based security policy enforcement points?

Flood guards

VDI/VDEs

Cloud access security brokers

A

Cloud access security brokers

Cloud access security brokers are on-premise or cloud-based security policy enforcement points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which feature of cloud computing involves dynamically provisioning (or deprovisioning) resources as needed?

Multitenancy

Elasticity

CMDB

A

Elasticity

Elasticity is a feature of cloud computing that involves dynamically provisioning (or de-provisioning) resources as needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the term for restricting an application to a safe/restricted resource area?

Fencing

Securing

Sandboxing

A

Sandboxing

Sandboxing is the term used for restricting an application to a safe/restricted resource area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following terms implies hosting data from more than one consumer on the same equipment?

Multitenancy

Duplexing

Bastioning

A

Multitenancy

Multitenancy implies hosting data from more than one consumer on the same equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When going with a public cloud delivery model, who is accountable for the security and privacy of the outsourced service?

The cloud provider and the organization

The cloud provider

The organization

A

The organization

Ultimately, the organization is accountable for the choice of public cloud and the security and privacy of the outsourced service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When your company purchased a virtual datacenter provider, you inherited a mess. The employees working there had to respond regularly to requests to create virtual machines without the disciplines and controls normally found in the physical world. This resulted in machines being over-provisioned (too much CPU, memory, or disk) and consuming resources long after they were no longer required. What type of problem is this?

VM escape

VM digress

VM sprawl

A

VM sprawl

VM sprawl can be a result of creating virtual machines without the disciplines and controls of the physical world. This can result in over-provisioning (too much CPU, memory, or disk), or consuming resources after they are no longer required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Although a hybrid cloud could be any mixture of cloud delivery models, it is usually a combination of which of the following?

Public and community

Public and private

Private and community

A

Public and private

While a hybrid cloud could be any mixture of cloud delivery models, it is usually a combination of public and private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which type of hypervisor implementation is known as “bare metal”?

Type I

Type II

Type III

A

Type I

Type I hypervisor implementations are known as “bare metal.”

17
Q

Which type of hypervisor implementation is known as “hosted”?

Type I

Type II

Type III

A

Type II

Type II hypervisor implementations are known as “hosted.”

18
Q

When your servers become too busy, you can offload traffic to resources from a cloud provider. This is known as which of the following?

Latency

Cloud bursting

Multitenancy

A

Cloud bursting

Cloud bursting means that when your servers become too busy, you can offload traffic to resources from a cloud provider

19
Q

What protocol is used by technologies for load balancing/prioritizing traffic?

ESX

QoS

IBJ

A

QoS

QoS (Quality of Service) makes load balancing/prioritizing possible

20
Q

What is the machine on which virtualization software is running known as?

Node

Workstation

Host

A

Host

The machine on which virtualization software is running is known as a host, whereas the virtual machines are known as guests