Misc Facts Flashcards

1
Q

What is a closed loop system?

A

In a closed-loop system, a controller is used to compare the output of a system with the required condition and convert the error into a control action designed to reduce the error and bring the output of the system back to the desired response.

In the cloud context, you can implement closed loop systems via automation - e.g. have cloudwatch logs/events/metrics or AWS Config detect deviation -> trigger lambda -> corrective action -> Restore system to desired state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What’s the difference between an Object and a File?

A

Objects include the content, metadata describing the content and object and unique address id for l

You can only do simple things: store, copy, retrieve, delete

It is a WORM - not suitable to store data bases
Replications takes time - not suitable for data that constantly changes.

File Stores - has a file structure (files/folders); normally it is NAS (uses NFSv4 e.g. EFS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What’s the difference between NAS and SAN?

A

NAS = Network Attached Storage - typically a file server using NFS protocol (e.g. EFS); multiple computers can share NAS

SAN = Storage Area Network - allocated to single user. They can format it and implement a file system in that space. E.g. EBS. Use iSCSI or Fiber Channel protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the Diffie-Hellman Key Exchange Process?

A

It is used for asymmetric encryption.

Used to create a shared symmetric key over an un-trusted medium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is WDE/FDE?

A

FDE/WDE = Full/Whole Disk Encryption (e.g. Bitlocker)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the different components of the TLS Protocol?

A
  1. TLS Handshake protocol - cipher suite negotiation, authentication of client and server, session key information exchange
  2. TLS Record protocol - - uses keys setup to secure application data. Actual secure method for transferring data. Verifies integrity.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When AWS says data in transit is triple-encrypted what do they mean?

A
  1. Physical layer - data that leaves any AWS data center is automatically encrypted at the physical layer
  2. Network Layer - data between different instances in a VPC or between VPCs in different regions are encrypted at the network layer (Nitro VPC Card) - but only for supported instance types.
  3. Application layers - customers have the option to use TLS encryption; AWS supports TLS encrypted endpoints.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly