CCSP Domain 3: Cloud Platform & Infrastructure Security Flashcards

1
Q

Reservation, compute

A

guarantees a minimum resource allocation per vm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Limits, compute

A

a maximum (ceiling) resource allocation at the vm or service level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Shares, compute

A

a queue that arbitrates contention over compute resources when those resources become constrained

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Network Function Virtualization (NFV)

A

NFV decouples network services from hardware deployment allowing for software defined data prioritization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Software Defined Networking (SDN)

Management plane
Control plane
Data plane

A

The architecture of SDN is focussed on the forwarding of data rather than the function of infrastructure.

Management plane: applications that manage the control plane

Control plane: control of network functionality and programability

Data plane / Forwarding plane: infrastructure such as switches and routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Storage Area Network (SAN)

A

Consolidated block-level data storage often used to enhance storage devices (e.g. disk arrays, tape libraries, etc.).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Network-attached Storage (NAS)

A

A file-level computer data storage server connected to a computer network to allow sharing at the local level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Interoperability between cloud services

  Policy
  Behavioral
  Transport
  Syntactic
  Semantic
A

Policy: do both services meet or exceed the laws, regulations, and organizational mandates required by the cloud customer.

Behavioral: is there service parity – both can deliver the same ‘behaviors’ and outcomes?

Transport: are the transport technologies (HTTPS, TLS, etc.) apples to apples or interoperable?

Syntactic: source system shares data using technologies that can be decoded within the target system such as JSON, XML, or open virtualization format (OVF).

Semantic: transfer from source to target such that the data model is understood by the target – e.g. the formula for derived data values are disclosed to enable replication, repetition, or modification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cloud data portability

Syntactic
Semantic
Policy

A

Syntactic: source system shares data using technologies that can decode within the target system such as JSON, XML, or open virtualization format (OVF).

Semantic: transfer from source to target such that the data model understood by the target – e.g. the formula for derived data values are disclosed to enable replication, repetition, or modification.

Policy: do both services meet or exceed the laws, regulations, and organizational mandates required by the cloud customer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ISO/IEC TS 22237-2

A

Requirements for construction of data centers; key areas of focus are location / site selection, construction standards, building configuration, fire protection, and quality measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Uptime institute tiers

A

CCSP should always note the difference between uptime and availability.

Tier I: basic site infrastructure
(e.g. 80% uptime)

Tier II: redundant site infrastructure capacity components
(e.g. 90% uptime)

Tier III: concurrently maintainable site infrastructure
(e.g. 95.0% uptime)

Tier IV: fault-tolerant site infrastructure
(e.g. 99.9%)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Types of fire detectors

A

Flame: photoelectric [ infrared, visible light, UV ]

Smoke: photoelectric, ionization

Heat: rate-of-rise in temperature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fire suppression, Gas Systems

A

Aero-K: aerosolized potassium (non-corrosive)

FM-200: liquified compressed gas (does not displace oxygen – can be used in populated spaces)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cyber Kill Chain

  Reconnaissance
  Weaponization
  Delivery
  Exploitation
  Installation
  Command and Control
  Actions of objectives
A

A model for event and incident management:

Reconnaissance: attacker surveils target environment

Weaponization: attacker determines and optimizes exploits

Delivery: attacker delivers the exploits

Exploitation: exploits find purchase in the target environment

Installation: attacker seeks to persist their presence in the target environment

Command and Control: attackers seeks to establish two-way, persistent, communication channel – i.e. maintain persistence

Actions of objectives: attacker exfiltrates, destroys, etc., per their attack objective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly