Lesson 6: Secure Cloud Network Architecture Flashcards

1
Q

Define a ‘cloud deployment model’

A

Classifying the ownership and management of a cloud as public, private, community, or hybrid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define a ‘Public (or multi-tenant)’ cloud model

A

A cloud that is deployed by cloud service providers (CSPs) for shared use by multiple independent tenants; Subscriptions or pay-as-you-go financing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define ‘Multi-cloud architecture’

A

Cloud deployment model where the cloud consumer uses multiple public cloud services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define a ‘Hosted Private’ cloud model

A

Hosted by a third party for the exclusive use of an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define a ‘Private’ cloud model

A

A cloud that is deployed for use by a single entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define a ‘Community’ cloud model

A

A cloud that is deployed for shared use by cooperating tenants/organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define ‘Single-tenant architecture’

A

Dedicated infrastructure to a single customer, ensuring that only that customer can access the infrastructure; More secure but most expensive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define ‘Multi-tenant architecture’

A

Multiple customers share the same infrastructure, with each customer’s data and applications separated logically from other customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are positives/negatives of Multi-tenant architecture?

A

Cost-effective but can increase the risk of unauthorized access or data leakage if not properly secured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define ‘Hybrid architecture’

A

Combination of public and private cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define ‘Serverless architecture’

A

Cloud provider manages the server infrastructure and automatically scales resources up or down based on demand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define a ‘Cloud service model’

A

Classifying the provisioning of cloud services and the limit of the cloud service provider’s responsibility as software, platform, infrastructure, and so on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define ‘anything as a service (XaaS)’

A

The concept that most types of IT requirements can be deployed as a cloud service model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define ‘Software as a service (SaaS)’

A

A cloud service model that provisions fully developed application services to users; O365, Salesforce; RingCentral.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define ‘Platform as a service (PaaS)’

A

Between SaaS and IaaS; Cloud service model that provisions application and database services as a platform for development of apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define ‘Infrastructure as a service (IaaS)’

A

A cloud service model that provisions virtual machines and network infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define a ‘Third-party vendor’

A

External entities that provide organizations with goods, services, or technology solutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How do organizations manage 3rd party vendor (CSP) agreements?

A

By adopting SLAs (Service Level Agreements) to mitigate cloud platform risks, ensure service quality, and optimize cloud deployments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Define a ‘Service Level Agreement (SLA)’

A

Contractual agreement between organizations and service providers that outline the expected levels of service delivery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the purpose of a Service-level agreement (SLA)?

A

Provide a framework to hold vendors accountable for delivering services at required performance levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What components of Service-level agreements (SLAs) determine service levels?

A

Metrics, such as uptime, performance, and support response times, along with penalties or remedies if service levels are not met.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Define ‘Centralized computing architecture’

A

A model where all data processing and storage is performed in a single location, typically a single server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Define ‘decentralized computing architecture’

A

A model in which data processing and storage are distributed across multiple locations or devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are examples of Centralized computing architecture?

A

Mainframe computers and client-server architectures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are examples of decentralized computing architecture?

A

Blockchain, Peer-to-peer (P2P) networks, Content delivery networks (CDNs), IoT devices, Tor, Distributed databases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the foundation of cloud services?

A

Virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Define ‘high availability (HA)’

A

Metric that defines how closely systems approach the goal of providing service/data availability 100% of the time while maintaining a high level of system performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

How is high high availability (HA) achieved?

A

Redundancy of hardware/links; Replication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Define ‘Replication’

A

Automatically copying data between two processing systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Define ‘synchronous replication’

A

Data is copied from one system to another simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Define ‘asynchronous replication’

A

Data is copied from a primary system to a secondary system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Define ‘hot storage’

A

CSP storage performance tier; Data is retrieved quickly at a high rate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Define ‘cold storage’

A

CSP data storage performance tier where data is retrieved at a slower at a rate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is the best replication solution for a cloud database?

A

Low-latency hot storage with synchronous replication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

How can an organization provide a lower latency service to customers utilizing a cloud service?

A

Provisioning resources in multiple availability zones and regions.

36
Q

List the 3 cloud service provider replication tiers

A
  1. Local replication
  2. Regional replication
  3. Geo-redundant storage
37
Q

Define ‘local replication’

A

Replicates customer data within a single datacenter in the region where you created your storage account.

38
Q

Define ‘Regional replication/zone-redundant storage’

A

Replicates customer data across multiple datacenters within one or two regions.

39
Q

Define ‘Geo-redundant storage (GRS)’

A

Replicates customer data to a secondary region that is distant from the primary region.

40
Q

Define ‘Application virtualization’

A

A software delivery model where the code/application runs on a server and is streamed to a client.

41
Q

What protocol is the foundation of Application virtualization?

A

HTLM5 because users can access them through ordinary web browser software.

42
Q

Define ‘Containerization’

A

Enforces resource separation at the operating system level and containing everything required to run a service, application, or microservice.

43
Q

How does an OS separate containers?

A

OS defines isolated “cells” for each user instance to run in and is allocated CPU and memory resources.

44
Q

Define a ‘virtual private cloud (VPC)’

A

A private network segment made available to a single cloud consumer on a public cloud.

45
Q

What are typical services of a virtual private cloud (VPC)?

A

Authentication, web applications, and communications.

46
Q

What is the infrastructure used to support a virtual private cloud (VPC)?

A

Applications are developed as functions and microservices, each interacting with other functions to facilitate client requests.

47
Q

Define a ‘Microservice’

A

An independent, single-function module with well-defined and lightweight interfaces and operations.

48
Q

What is the purpose of a ‘Microservice’

A

Architectural approach to building software applications as a collection of small and independent services focusing on a specific business capability.

49
Q

Define ‘Infrastructure as Code (IaC)’

A

Deployment/management of infrastructure is performed by scripted automation and orchestration using machine-readable definition files.

50
Q

List different file types that contain code that is read and executed by machines in Infrastructure as Code (IaC)

A

YAML, JSON, and HCL (HashiCorp Configuration Language.)

51
Q

What is defined in files like YAML, JSON, and HCL (HashiCorp Configuration Language)?

A

Configuration settings, networking requirements, security policies, and other settings.

52
Q

What is the main purpose of Infrastructure as Code (IaC)?

A

Infrastructure can be deployed and managed automatically and consistently, reducing the risk of errors caused by manual intervention.

53
Q

What is a secondary benefit of Infrastructure as Code (IaC)?

A

Replicate infrastructure across different environments, such as development, staging, and production, to ensure that the environments are consistent.

54
Q

Define ‘Edge Computing’

A

Cloud networking concept utilizing distributed computing resources to minimize the distance data needs to travel.

55
Q

What is the purpose of edge computing?

A

To reduce network latency and improve responsiveness.

56
Q

Define ‘software-defined networking (SDN)’

A

Networking model with APIs and compatible network appliances enabling programmable networking.

57
Q

What are the 3 ‘planes/levels’ of software-defined networking (SDN)?

A
  1. Control Plane
  2. Data Plane
  3. Management Plane
58
Q

Define the ‘Control Plane’

A

Makes decisions about how traffic should be prioritized, secured, and where it should be switched.

59
Q

Define the ‘Data Plane’

A

Handles the switching and routing of traffic and enforcement of security access controls.

60
Q

Define the ‘Management Plane’

A

Monitors traffic conditions and network status.

61
Q

What is the management plane comprised of?

A

Administrators and their devices along with front end management.

62
Q

How are decisions from the control plane processed at the data plane?

A

A network controller application, which interfaces with the network devices using APIs.

63
Q

Define a ‘northbound API’

A

Interface between the SDN applications and the SDN controller (Control plane to Management plane).

64
Q

Define ‘southbound API’

A

Interface between the SDN controller and the SDN appliances (Control plane to Data plane).

65
Q

Define an ‘Interconnection Security Agreement (ISA)’

A

Establishes the security requirements and responsibilities between the organization and the cloud service provider.

66
Q

What is the purpose of an Interconnection Security Agreement (ISA)

A

To define encryption methods, access controls, vulnerability management, data segregation techniques, specify data ownership, audit rights, and data backup, recovery, and retention procedures.

67
Q

What are the two main cloud security considerations?

A

Data protection and pathing of services.

68
Q

Define ‘Software-Defined Wide Area Network (SD-WAN) ‘

A

Services that use software-defined mechanisms and routing policies to implement virtual tunnels and overlay networks over transport networks.

69
Q

What is the purpose of an organization implementing Software-Defined Wide Area Network (SD-WAN)?

A

Enables organizations to connect their various branch offices, datacenters, and cloud infrastructure over a wide area network (WAN).

70
Q

Define ‘Secure Access Service Edge (SASE)’

A

Combines security services like firewalls, identity and access management, and secure web gateway with networking services such as SD-WAN to provide access to cloud applications.

71
Q

Define an ‘Embedded system’

A

Electronic system that is designed to perform a specific, dedicated function.

72
Q

What are examples of items that use embedded systems?

A

Smartphones, Automotive systems, medical devices, aerospace and defense.

73
Q

Define a ‘Real-Time Operating Systems (RTOS)’

A

A type of OS high levels of stability and processing speed to ensure consistent response.

74
Q

Define ‘Internet of Things (IoT)’

A

The network of physical devices, and other objects embedded with sensors, software, and connectivity, enabling them to collect and exchange data.

75
Q

How does oversaturation of IoT devices cause security risk?

A

Too many devices to manage securely; IoT devices are designed with limited processing power and memory, making it difficult to implement strong security controls.

76
Q

Define ‘zero trust’

A

Security design paradigm where every/any request (host-to-host or container-to-container) must be authenticated before being allowed.

77
Q

Define ‘Deperimeterization’

A

Security approach that shifts the focus from defending a network’s boundaries to protecting individual resources and data within the network.

78
Q

How is deperimeterization achieved?

A

Authentication, encryption, access control, and continuous monitoring to maintain the security of critical resources regardless of location.

79
Q

What are the 3 fundamental concepts of zero trust architecture?

A
  1. Adaptive Identity
  2. Threat scope reduction
  3. Policy-driven access control
80
Q

Define ‘Adaptive Identity’

A

Recognizes that user identities are not static and that identity verification must be continuous and based on a user’s current context and the resources they are attempting to access.

81
Q

Define ‘Threat scope reduction’

A

Similar to role based access/least privilege; access is limited to only those resources required to complete a specific task.

82
Q

Define ‘Policy-driven access control’

A

Attribute Based Access Control (ABAC); Access control policies enforce access restrictions based on user identity, device posture, and network context.

83
Q

Define ‘device posture’

A

Refers to the security status of a device, including its security configurations, software versions, and patch levels.

84
Q

Combining a software defined networking, and zero trust architecture, what is the role of the control plane?

A

Defines/manages policies that dictate how users and devices are authorized to access network resources.

85
Q

Combining a software defined networking, and zero trust architecture, what is the role of the data plane?

A

Systems in the data plane establish sessions for secure information transfers between resources.