Cloud & Virtual Flashcards

1
Q

4 types of cloud deployment models

A
  • Private
    – Your own virtualized local data center
  • Public
    – Available to everyone over the Internet
    – Amazon etc
  • Hybrid
    – A mix of public and private
  • Community
    – Several organizations share the same resources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is (IaaS)

A

Infrastructure as a service (IaaS)
Networking, Servers, Storage, Virtualization

  • Sometimes called Hardware as a Service (HaaS)
    – Outsource your equipment
  • You’re still responsible for the management
    – And for the security
  • Your data is out there, but more within your control
    – Web server providers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is (SaaS)

A

Software as a service (SaaS)
It does everything

  • On-demand software
    – No local installation
    – Why manage your own email distribution?
    Or payroll?
  • Central management of data and applications
    – Your data is out there
  • A complete application offering
    – No development work required
    – Google Mail, Microsoft 36
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is (PaaS)

A

Platform as a service (PaaS)
biz only do application and data. Nothing else

  • No servers, no software, no maintenance team, no HVAC
    – Someone else handles the platform,
    you handle the development
  • You don’t have direct control of the data,
    people, or infrastructure
    – Trained security professionals are watching
    – Choose carefully
  • Put the building blocks together
    – Develop your app from what’s available on the platform
    – SalesForce.com
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Internal cloud?

A

– No resources are shared
– Build your own cloud
– Pay for everything up front
– No ongoing costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is External cloud?

A

External cloud
– Share resources with a public cloud
– Underlying infrastructure owned by a third-party
– Cost may be metered or up-front

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Metered vs non-metered

A

Metered cloud services
– You pay for what you use
– Cost to upload
– Cost to store
– Cost to download

  • Non-metered
    – You pay for a block of storage
    – No cost to upload
    – No cost to download
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name 3 Cloud computing characteristics

A
  • Rapid elasticity
    – Scale up and scale down as needed
    – Seamless to everyone
    – The cloud enables instant resource provisioning
  • High availability
    – Systems are always available
    – Redundancy provides availability
  • File synchronization
    – Information can be duplicated across cloud locations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is desktop as a service?

A
  • Basic application usage
    – Applications actually run on a remote server
    – Virtual Desktop Infrastructure (VDI),
    Desktop as a Service (DaaS)
    – Local device is a keyboard, mouse, and screen.
  • Minimal operating system on the client
    – No huge memory or CPU needs
  • Network connectivity
    – Big network requirement
    – Everything happens across the wire
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is virtualization?

A
  • One computer, many operating systems
    – macOS, Windows 11, Linux Ubuntu,
    all at the same time!
  • Separate OS, independent CPU, memory, network, etc.
    – But really one computer
  • Host-based virtualization
    – Your normal desktop plus others
  • Standalone server that hosts virtual machines
    – Enterprise-level
  • Been around since 1967
    – IBM mainframe virtualization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is virtualization used? 2

A

Legacy software and operating systems
* Need to run different application versions
on the same system
– Run each application instance in a separate VM

  • Application only runs on a previous OS version
    – Create a VM with the older operating system

Cross-platform virtualization
* Windows / macOS / Linux doesn’t do everything
– Each OS has strengths and weaknesses

  • Run different operating systems at the same time
    – Move between each OS seamlessly
    – No rebooting
  • Save time and resources
    – One physical computer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a hypervisor?

A
  • Virtual Machine Manager
    – Manages the virtual platform and
    guest operating systems
  • May require a CPU that supports virtualization
    – Can improve performance
  • Hardware management
    – CPU, networking, security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are hypervisor resource requirements?

A
  • CPU Processor Support
    – Intel: Virtualization Technology (VT)
    – AMD: AMD-V
  • Memory - Above and beyond host OS requirements
  • Disk space - Each guest OS has it’s own image
  • Network
    – Configurable on each guest OS
    (standalone, NAT, bridged, etc.)
    – Virtual switch
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is sandboxing?

A
  • Isolated testing environment
    – No connection to the real world or production system
    – A technological safe space
  • Virtualize development process
    – Try some code, break some code, nobody gets hurt
  • Additional development features
    – Roll back to a previous snapshot
    – Run additional systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why use sandboxing?

A

Building the application
* Develop
– Secure environment
– Writing code
– Developers test in their sandboxes
* Test
– A separate virtual environment for testing
– Still in the development stage
– All of the pieces are put together
– Does it all work?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are Hypervisor security concerns?

A
  • Hypervisor is a sweet spot for the bad guys
    – No significant vulnerabilities yet
  • VM escaping
    – Malware recognizes it’s on a virtual machine
    – Malware compromises the hypervisor
    – Malware jumps from one guest OS to another
  • Many hosted services are virtual environments
    – Malware on one customer’s server can gather
    information from another
17
Q

What is Guest operating system security?

A
  • Every guest is self-contained - Like a real computer
  • Use traditional security controls
    – Host-based firewall, Anti-virus, anti-spyware
  • Watch out for rogue virtual machines (VMs)
    – The bad guys try to install their own system
    – You’re in big trouble
  • Self-contained VMs provided by 3rd parties
    can be dangerous
    – You have no idea what’s running on there
18
Q

What are VM Network requirements ?

A
  • Most client-side virtual machine managers have
    their own virtual (internal) networks
  • Shared network address
    – The virtual machine shares the same IP address
    as the physical host
    – Uses a private IP address internally
    – Uses NAT to convert to the physical host IP
  • Bridged network address
    – The VM is a device on the physical network
  • Private address
    – The VM does not communicate outside of
    the virtual network