Domain 5 Operations Flashcards

1
Q

Temperature and Humidity

A

Temperature: 64-80 F
Humidity: 40-60%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Design Standards

A

BISCI: cabling for data systems

IDCA: Infinity Program comprehensive data center design framework

NFPA: Fire protection standard

Uptime Institute: Data Center Tiers and typologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Uptime Institute Tiers

A

Tier 1:
- Little redundancy, space for systems, UPS for line conditioning

Tier 2:
-Some redundancy, critical operation do not have to be interrupted for maintenance, unplanned failures may result in downtime

Tier 3:
Concurrently maintainable site infrastructure, dual power supplies.

Tier 4:
- Fault tolerant site infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

iSCSI

A

. Most prevalent protocol for network based storage.

. allows use of block level storage that looks and behaves like a SAN over TCP

. Recommended to be run over its own segregated network

. Does not support encryption, must be protected by other means

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

KVM

A

. MFA recommended

. Comprehensive audit and logging program should be in place

. KVM connectivity should be isolated on its own specific physical channel.

. should be configured to allow access to one host at a time.

. No transfer of data between host via KVM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TLS

A

X.509 certificated

  • TLS Handshake Protocol: negotiates and established TLS connections and enables the secure channel to handle communications
  • TLS Record Protocol: responsible for the ecryptions and authentications of packets throughout their transmission an between the parties.
  • Transport layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IPSEC

A
  • Operates at the network layer

- Performs both authentication and negotiation of security policies and maintains throughout the communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Distributed Resource Scheduling (DRS)

A

used within clustered systems to provide high availability, scaling, management ,workload distribution and balancing of jobs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Dynamic Optimization (DO)

A

process through which the cloud environment is constantly maintained to ensure resources are available when and where needed and that physical nodes do not become overloaded or near capacity while others are underutilized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Maintenance mode

A

Physical hosts

no virtual machine can be run

logging should be maintained.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

4 key areas of a physical cloud environment

A

CPU,
memory,
disk
network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Orchestration

A
pertains to the use of automation for task such as
provisioning
scaling
allocation of resources
customer billing and reporting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Incident management

A

Incident- an event that can lead to a disruption of an organizations service or operations

Incident management-focused on limiting the impact of the events on an organization and returning their state to full operation as quickly as possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Problem management

A

Focus is to analyze and identify potential issues and put processes and mitigations in place to prevent predictable problems from occurring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Incident response cycle and process

A
  1. Incident Occurs
  2. Classified
  3. Determine Resolution
  4. Implement Resolution
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Assessing Risk

A
  1. Determine the specific threats the organization and their systems face.
  2. Assess the vulnerabilities of a particular system
  3. Evaluate the potential harm that an attack can cause to an organization’s systems, data, operations and reputation
  4. Determine the likelihood of a successful attack and the harm that it could cause.
17
Q

Quantitative Assessment

A

SLE = Asset value X Exposure Factor

ALE = SLE x Annual Rate of Occurrence