Cloud Computing And Remote Access Flashcards Preview

Applied Networking Security > Cloud Computing And Remote Access > Flashcards

Flashcards in Cloud Computing And Remote Access Deck (20):
1

What are cloud computing features?

On demand service
Elastic services
Multiple platform support
Resource pooling

2

What is cloud computing?

Flexible provisioning of compute, storage, and network resources, and other services to multiple clients

3

What are different types of cloud models?

Public, private, hybrid, infrastructure as a service, platform as a service, software as a service

4

What is a public cloud model?

Resources and services owned and hosted by a third party

5

What are private cloud models?

Resource and services owned by an organization and available to internal clients

6

What is a hybrid cloud model?

Utilize resources and services of both private and public

7

Infrastructure as a service ' cloud model

Hardware and network resources provided

8

What is remote access?

Service allowing connection to a resource from a remote location

9

What are types of remote access

Remote connection to os
Dedicated lines b/w sites
Vurtual private network (vpn)

10

What is a virtual private network?

Connection b/w devices, networks or devices and networks
-Traffic is tunneled(encapsulated within host network pdu)
May secure communication- of confidentiality, integrity, and availability

11

What is layer 2 traggic tunneling (vpn)

Doblayer 3 later too

12

What is encryption

Transforming data with a mathematic algorithm
Data can only be read with a cypher
Used to keep info private

13

What is a key?

Random string of charactors
Used in conjuction with data and cypher to create unique data block

14

What is cipher text?

Encrypted block of data

15

What is a brute force attack

Attempt to break encryption by guessing keys

16

What is symmetric encryption

Also called private encryption or shared key
Same key is used to encrypt or decrypt data
Most efficient
Key must be known by multiple parties

17

What is asymmetric encryption

2 keys, know as key pair
One key encrypts one decrypts
Requires a public key server

18

What is a digital certificate?

Contains identification information about key owner and public key

19

What is central authority

Issues and maintains digital certificates
Public ca,s are trusted

20

What is public key infrastructure

Secures internet with public ca's