Domain-3 Flashcards

1
Q

Cloud Service Consumer

A

maintains a business relationship with, and uses service from, Cloud Service Providers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cloud Service Provider

A

responsible for making a service available to service consumers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cloud Carrier

A

provides connectivity and transport of cloud services between Cloud Providers and Cloud Consumers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Reservations

A

Guaranteed MINIMUM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Limits

A

Absolute MAXIMUM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Shares

A

If we fight.. we fight based on ranking !!! Used ONLY when we have a resource contention situation (too many requests, not enough resources)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Type 1 Hypervisor

A

Bare Metal, Embedded or Native Hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Type 2 Hypervisor

A

installed on top of the host’s operating system and

then supports other guest operating systems running above it as virtual machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Network traffic between VMs

A

not necessarily visible to physical network security controls, which means additional security controls may be necessary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Virtual machines and their disk

A

are simply files residing somewhere. This means that, for example, a stopped VM is potentially accessible on a file system by third parties if no controls are applied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Management Plane

A

Provides administrators with the ability to remotely manage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the management plane is the most powerful tool in the entire cloud infrastructure

A

it will also integrate authentication, access control, and logging and monitoring of resources use

pathway for individual tenants who will have limited and controlled access to the cloud’s resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

management plane’s primary interface is the API

A

both toward the resources managed as well as toward the users

graphical user interface (i.e., web page) is typically built on top of those APIs. These APIs allow automation of control tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the 4 layers of Data Center Security

A
  1. Perimeter Security
  2. Facility Controls
  3. Computer Room Controls
  4. Cabinet Controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Perimeter security

A

discourage, detect, and delay any unauthorized entry

achieved through a high-resolution video surveillance system, motion-activated security lighting, fiber-optic cable, etc. Video content analytics (VCA) can detect individuals and objects and check for any illegal activity. Track movements of people and avoid false alarms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Facility controls

A

the second layer of defense restricts access

card swipes or biometrics
High-resolution video surveillance and analytics can identify the person entering and also prevent tailgating
More complex VCA can read license plates, conduct facial recognition, and detect smoke and fire threats

17
Q

Computer room controls

A

restricts access through diverse verification methods including:
monitoring all restricted areas, deploying entry restrictions such as turnstile, providing VCA, providing biometric access control devices to verify finger and thumb prints, irises, or vascular pattern, and using radio frequency identification

18
Q

Cabinet controls

A

addresses the fear of an “insider threat,” such as a malicious employee

19
Q

Tier I

A

Basic Site Infrastructure

20
Q

Tier II

A

Redundant Site Infrastructure Capacity Components

21
Q

Tier III

A

Concurrently Maintainable Site Infrastructure

22
Q

Tier IV

A

Fault-Tolerant Site Infrastructure

23
Q

Vulnerability

A

weakness

24
Q

Likelihood

A

the chance something might happen

25
Q

Impact

A

what a threat will cost (quantitative/qualitative)

26
Q

Countermeasure (control)

A

the mechanism applied to minimize risk

27
Q

Residual Risk

A

remaining risk(s) after all countermeasures/controls have been applied

28
Q

Threat

A

an event or situation that if it occurred, would prevent the organization from operating in its normal manner