Cloud Security Flashcards

1
Q

What is Service Orchestration?

A

the process of coordinating tools, applications, application programming interfaces (APIs), and infrastructure across private and public clouds into comprehensive workflows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Service Management?

A

Service management involves the planning, delivery, and support of cloud services to meet business needs. It encompasses service level agreements (SLAs), monitoring, incident management, and governance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Business continuity?

A

Business continuity ensures that critical business functions can continue during and after disruptions. It involves disaster recovery, backup strategies, and high availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Deployment Models?

A

represents a specific type of cloud environment, primarily distinguished by ownership, size, and access.
There are four cloud deployment models: public, private, community, and hybrid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is IAM?

A

a security framework deployed in the cloud used to verify users and control their access rights, including issuing and denying access privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is KMS?

A

Cloud KMS is a REST API that can use a key to encrypt, decrypt, or sign data, such as secrets for storage.

KMS allows for centralized key management, simplifying the process of creating, rotating, and revoking encryption keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are cloud Service Models?

A

SaaS (Software as a Service), IaaS (Infrastructure as a Service), and PaaS (Platform as a Service).They provide you with different levels of control, flexibility, and management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is learning outcome 1?

A

Compare and contrast the various cloud delivery and deployment models,
particularly with consideration for regulatory compliance and digital forensics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is learning outcome 2?

A

Analyse virtualisation technology and current attacks against it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is learning outcome 3?

A

Critically evaluate service orchestration, business continuity, security, and
service management functions for a cloud infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is learning outcome 4?

A

Appraise the mechanisms used to secure cloud computing platforms, including Key
Management Services (KMS) and Identity and Access Management (IAM).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are four different virtualization attack methods?

A

VMaware Malware
Escape attack
Hyperjacking
Theft-of-Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the key concepts to IAM?

A

Users
Groups
Roles
Policies
Permissions
Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the key concepts to KMS?

A

Key policies
CloudTrail
Cryptographic operations (Encryption, decryption, signing, and verification)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly