Cloud Security Flashcards

1
Q

What is Cloud?

A

Refers to a cloud computing which is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly
provisioned and released with minimal management effort or service provider interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Cloud Computing?

A

Concept of creating a service using shared resources that may hosted on the internet or private networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the benefits of Cloud Computing?

A

Scalable, Flexibility, Integration, Fast Access, Lower Cost, Simplicity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 3 Cloud Computing Service Models?

A

IaaS (Infrastructure as a Service)
PaaS (Platform as a Service)
Saas (Software as a Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 3 Deployment Model?

A

Public Cloud, Private Cloud and Hybrid Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 3 Service Models?

A

Xaas (Anything as a Service), Saas (Desktop as a Service), DRaaS (Disaster Recovery as a Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 2 Cloud Vendors?

A

AWS (Amazon Web Services), Microsoft Azure, Google Cloud Platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the responsibility of the Cloud Provider?

A

Responsible mainly for infrastructure, in accordance with the service plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the responsibility of the Cloud Client?

A

Responsible for the data and accountability within the framework of the service plan (data, OS, apps, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Public Cloud?

A

Uses provider resources and host services open to others (sharing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Private Cloud?

A

Separate for each customer, private customizable environment, offers a higher level of reliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Hybrid Cloud?

A

Public and Private combined, running app interchangeably, privately, or public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is EC2?

A

Amazons Elastic Compute Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A type of cloud infrastructure available solely for a single organization is known as?

A

Private Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which is a cloud computing delivery model in which cloud infrastructure is provisioned for open use by the general public?

A

Public Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A cloud delivery model consisting of two or more interlinked cloud infrastructures (private, community, or public) is referred to as a hybrid cloud.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which cloud infrastructure type would be the most suitable for a group of organizations sharing common interests?

A

Community cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which is a cloud computing service model in which clients, instead of buying all the hardware and software, purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment and software?

A

IaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A cloud computing service model offering remote access to applications based on monthly or annual subscription fee is called:

A

SaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which cloud service model would provide the best solution for a web developer intending to create a web app?

A

PaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In cloud computing, the term “Metered service” refers to the cloud provider’s ability to track the computing resources consumers are accessing as well as the amount of resources they are consuming. It provides transparency for both the provider and consumer and is used, among other applications, for the purpose of billing.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In cloud computing, the term “Measured service” refers to a situation in which gaining access to resources does not require a flat fee. This type of billing model allows consumers to be charged variable rates depending on the exact amount of utilized resources.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the terms listed below refers to a cloud computing feature that allows for automatic allocation of computing resources in proportion with the demand?

A

Rapid elasticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is metered service?

A

A fee charged by cloud service providers on the basis of how much of a resource was used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is measured service?

A

A billing model cloud service providers use to charge for services in small increments based on the computing resources the customer consumes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is persistent VDI?

A

each user gets his or her own persistent virtual desktop – also known as a one-to-one ratio. User connects to the same desktop each time, and user can personalize the desktop for their needs since changes are saved even after the connection is reset.

27
Q

What is nonpersistent VDI?

A

Nonpersistent desktops are many-to-one, meaning that they are shared among end users. In nonpersistent none of the users’ configurations or application data gets saved

28
Q

What is VM escape?

A

Is an attack that allows an attacker to access the host system from within the virtual system. attacker runs code on a VM that allows an operating system running within it to break out and interact directly with the hypervisor.

29
Q

How do mitigate VM escape?

A

Updating software regularly. Installing updates and patches the moment they are available will reduce the risk of someone exploiting bugs in the virtualization software or other software running in the virtual environment. Isolating virtual environments.

30
Q

What is VM sprawl?

A

VM sprawl - occurs when the number of virtual machines (VMs) on a network reaches a point where administrators can no longer manage them effectively.

31
Q

How do mitigate VM sprawl?

A

Audit VMs. It may seem like a simple solution, but make it a policy that every VM and virtual server must be documented and registered.
Optimize storage and implement data policies. …
Implement lifecycle management tools. …
Implement VM archiving.

32
Q

What is an example of on-premises VDI solution?

A

Local server hosting virtualized OS

33
Q

What its a characteristic of persistent VDI: (Select 2 answers)

A

Each user runs their own copy of virtual desktop, At the end of a session, user data and personal settings are saved

34
Q

What its a characteristic of a non-persistent VDI? (Select 2 answers)

A

At the end of a session, user desktop reverts to its original state, Virtual desktop is shared among multiple users

35
Q

Which of the following answers refers to a cloud-based VDI service?

A

DaaS

36
Q

Which of the terms listed below refers to a solution that allows multiple operating systems to work simultaneously on the same hardware?

A

Virtualization

37
Q

What is virtualization?

A

a solution that allows multiple operating systems to work simultaneously on the same hardware? Share resources

38
Q

What is a hypervisor?

A

is used to virtualize a system and manage virtual system resources.

39
Q

In virtualization technology, a software program that manages multiple operating systems (or multiple instances of the same operating system) on a single computer system is known as:

A

Hypervisor

40
Q

Which of the following statements describe disadvantages of virtualization? (Select 2 answers)

A

Multiple virtual machines run on a single host share hardware resources which has a degrading effect on performance
Hardware used for hosting virtual machines becomes a single point of failure

41
Q

For best performance, a custom workstation designed for virtualization tasks needs: (Select 3 answers)

A

Large, fast hard drive, Maximum RAM, Maximum CPU cores

42
Q

A set of Intel CPU HAV enhancements is called?

A

VT-x

43
Q

Which of the answers listed below refers to HAV enhancements developed by AMD for its CPUs?

A

AMD-V

44
Q

The term “VM sprawl” is used to describe a situation in which large number of deployed virtual machines lack proper administrative controls.

A

True

45
Q

The term “VM escape” refers to the process of breaking out of the boundaries of a guest operating system installation to access the primary hypervisor controlling all the virtual machines on the host machine

A

True

46
Q

Which of the following security measures can be used to prevent VM sprawl? (Select 2 answers)

A

Usage audit and asset documentation

47
Q

What are the countermeasures against VM escape?

A

Sandboxing and patch management

48
Q

What is the difference in Hypervisor Type 1 and Hypervisor Type 2

A

Type 1 runs directly on system hardware and Type 2 runs on the host operating system

49
Q

What is on-premise?

A

Computing services that operated locally

50
Q

What is off-premise?

A

Computing services that operated remotely

51
Q

What are containers?

A

Containers are packages of software that contain all of the necessary elements to run in any environment.

52
Q

What is used to run containers run on and what platform?

A

Docker is a PaaS that uses virtualization to deliver software in packages called
containers

53
Q

Virtual Containers and virtual machines are the same?

A

False Virtual machine is has its own OS kernal container share hot OS kernal
VM separate libraries and config file, container share
boot time quicker on container and smaller size

54
Q

What is Security as a Service (SECaaS)?

A

A cloud-based method of outsourcing your cybersecurity. Outsourced security can cover data protection, VoIP security, database security, and general network security.

55
Q

What are the benefits of SECaas?

A

Cost savings, outsource experts, intelligence sharing, flexibility new information

56
Q

What are concerns of SECaas?

A

Visibility and data concealment, regulation, monitoring restrictions, information leakage, switching providers

57
Q

What is Cloud Access Security Broker (CASB)

A

A software or service (such as Forcepoint ONE) that acts as a gatekeeper and monitors data flow. Provides techniques for encryption, monitoring, identity management, and more.

58
Q

What is a Virtual Appliance?

A

Software appliance installed on a virtual machine. Preconfigured and ready to use OSs. They do not require installation. Use Open Virtualization Format (OVF) and
Open Virtual Appliance (OVA

59
Q

What is OVF?

A

Open Virtualization Format (OVF) is an open standard which contains multiple files as a package. For example, .ovf, .vmdk, .nvram, and so on. OVF supports exchange of virtual appliances across products and platforms.

60
Q

What is OVA?

A

Open Virtual Appliance (OVA) OVA is a single file distribution of the OVF file package.

61
Q

What is Data Center?

A

Collection of computing and network devices placed in a centralized location for more powerful computing power

62
Q

What is a SLA?

A

An agreement between the service provider and client regarding the provided service features and implementation

63
Q

What is the purpose of Virtualization?

A

Use a single machine for multiple simulated environments.

64
Q

What is the purpose of Cloud Computing?

A

Pool resources and automate for on-demand-use