Ch 18: Cloud Computing

¡Supera tus tareas y exámenes ahora con Quizwiz!

Hybrid Cloud

A cloud structure where elements are combined from private, public, and community cloud structures

Fog Computing

A distributed form of cloud computing, where the workload is performed on a distributed, decentralized architecture

Transit Gateway

A network connection that is used to interconnect virtual private clouds (VPCs) and on-premises networks

Virtual private cloud endpoint

Allows connections to and from a virtual private cloud instance

Serverless Architecture

Specifying compute requirements in terms of resources needed (for example, processing power and storage)

Virtual Desktop Infrastructure/Virtual Desktop Environment (VDI/VDE)

The infrastructure needed to enable the hosting of a desktop environment on a central server

Instance awareness

The name of a capability that must be enabled on firewalls, secure web gateways, and cloud access security brokers (CASBs) to determine if the next system in a communication chain is legitimate or not

Secrets management

The term used to denote the policies and procedures employed to connect the IAM systems of the enterprise and the cloud to enable communication with the data

Platform as a Service (PaaS)

The term used to describe the offering of a computing platform in the cloud

VM escape

When software, either malware or an attacker, escapes from one VM to the underlying OS

Which is the most critical element in understanding your current cloud security posture? a. Cloud service agreement b. Networking security controls c. Encryption d. Application security

a. Cloud service agreement

What is the primary downside of a private cloud model? a. Restrictive access rules b. Cost c. Scalability d. Lack of vendor support

b. Cost

You have deployed a network of Internet-connected sensors across a wide geographic area. These sensors are small, low-power IoT devices, and you need to perform temperature conversions and collect the data into a database. The calculations would be best managed by which architecture? a. Fog computing b. Edge computing c. Thin client d. Decentralized database in the cloud

b. Edge computing

One of the primary resources in use at your organization is a standard database that many applications tie into. Which cloud deployment model is best for this kind of application? a. SaaS b. PaaS c. IaaS d. None of the above

b. PaaS

Which cloud deployment model has the fewest security controls? a. Private b. Public c. Hybrid d. Community

b. Public

The policies and procedures employed to connect the IAM systems of the enterprise and the cloud to enable communication with the data is referred to as what? a. API inspection and integration b. Secrets management c. Dynamic resource allocation d. Container security

b. Secrets management

Which of the following is a security policy enforcement point placed between cloud service consumers and cloud service providers to manage enterprise security policies as cloud-based resources are accessed? a. SWG b. VPC endpoint c. CASB d. Resource policies

c. CASB

Resource policies involve all of the following except? a. Permissions b. IAM c. Cost d. Access

c. Cost

You are planning to move some applications to the cloud, including your organization's accounting application, which is highly customized and does not scale well. Which cloud deployment model is best for this application? a. SaaS b. PaaS c. IaaS d. None of the above

c. IaaS

Why is VM sprawl an issue? a. VM sprawl uses too many resources on parallel functions b. The more virtual machines in use, the harder it is to migrate a VM to a live server c. Virtual machines are so easy to create, so you end up with hundreds of small servers only performing a single function d. When servers are no longer physical, it can be difficult to locate a specific machine

d. When servers are no longer physical, it can be difficult to locate a specific machine


Conjuntos de estudio relacionados

Introduction to Education: Chapter 2

View Set

Series 65 Unit 22 Exam Questions

View Set

Sociology Chapter 4: Socialization

View Set