DOMAIN 14 Related Technologies Flashcards Preview

CCSK V4 - Domain 12 & 13 & 14 > DOMAIN 14 Related Technologies > Flashcards

Flashcards in DOMAIN 14 Related Technologies Deck (14)
Loading flashcards...

Define Big Data.

Gartner defines it as such: “Big data is high volume, high velocity, and/or high variety information assets that require new forms of processing to enable enhanced decision making, insight discovery and process optimization.”


What is 3 Vs?

These are the core definition of Big Data:

•• High volume: a large size of data, in terms of number of records or attributes.
•• High velocity: fast generation and processing of data, i.e., real-time or stream data.
•• High variety: structured, semi-structured, or unstructured data.


There are three common components of big data, regardless of the specific toolset used:

Distributed data collection,
Distributed storage,
Distributed processing


True/False: Not all big data technologies have robust security capabilities. In some cases cloud provider security capabilities can help compensate for the big data technology limitations.



True/False: Identity and Access Management will likely occur at both cloud and big data tool levels, which can
complicate entitlement matrices.



________ is a blanket term for non-traditional computing devices used in the physical world that utilize Internet connectivity. It includes everything from Internet-enabled operational technology (used by utilities like power and water) to fitness trackers, connected lightbulbs, medical devices, and beyond. These technologies are increasingly deployed in enterprise environments.

Internet of Things (IoT)


What does "Serverless Computing" mean?

Serverless computing is the extensive use of certain PaaS capabilities to such a degree that all or some of an application stack runs in a cloud provider’s environment without any customer-managed operating systems, or even containers.

“Serverless computing” is a bit of a misnomer since there is always a server running the workload someplace, but those servers and their configuration and security are completely hidden from the cloud user. The consumer only manages settings for the service, and not any of the underlying hardware and software stacks.


Serverless includes services such as:

•• Object storage
•• Cloud load balancers
•• Cloud databases
•• Machine learning
•• Message queues
•• Notification services
•• Code execution environments (These are generally restricted containers where a consumer runs uploaded application code.)
•• API gateways
•• Web servers


True/False: Serverless places a much higher security burden on the cloud provider.



True/False: Using serverless, the cloud user will not have access to commonly-used monitoring and logging levels, such as server or network logs.



True/False: Serverless can dramatically reduce attack surface and pathways and integrating serverless
components may be an excellent way to break links in an attack chain, even if the entire application stack is not serverless.



True/False: Incident response may also be complicated and will definitely require changes in process and
tooling to manage a serverless-based incident.



True/False: Cloud users should consider use of data masking or obfuscation when considering
a service that doesn’t meet security, privacy, or compliance requirements.



True/False: Although the cloud provider is responsible for security below the serverless platform level, the cloud user is still responsible for properly configuring and using the products.