Cloud Computing and Big Data CSU
Key performance measures you should evaluate prior to moving an application to the cloud include:
- demand periods - database storage requirements - bandwidth consumption - average number of users - disk storage requirements
Which of the following are advantages of cloud-based systems with respect to security?
- hardware and software redundancy - extended human relations reach - immediate deployment of software patches - timeliness of incident response - specialists instead of personnel
The following incremental phases are included in the SDLC approach:
1. Feasibility analysis 2. Requirements analysis 3. Design 4. Development and Testing 5. Deployment 6. Maintenance
PaaS examples are:
1. Force.com from Salesforce.com 2. LongJump with database support 3. NetSuite with (ERP) and CRM support 4. Cloud Foundry with Java, Ruby, and MySQL
The Apache Hadoop library of software is organized into four different modules:
1. Hadoop Common 2. Hadoop Distributed File System (HDFS) 3. Hadoop YARN 4. Hadoop MapReduce
key benefits of desktop virtualization include:
1. Reduced Application Conflicts 2. Lower Cost for Deployment and Maintenance 3. Greater Computing Flexibility
Advantages of SaaS include: ____________________.
1. They allow customers to pay on demand for software use 2. They offer application, processor, and data storage scalability 3. They offer device-independent access to many applications 4. They reduce or eliminate the need for an on-site data center 5. They increase disaster recovery and business continuity
Developers of mobile phone applications develop solutions in one of three ways:
1. Web pages tailored for smart phones 2. apps 3. widgets.
Potential disadvantages of a PaaS include:
1. concerns about data security 2. challenges to integrating cloud solutions with legacy software 3. risk of breach by the PaaS provider
To manage the various virtual guest operating systems on a single physical server a ______________, or ___________________, is used.
1. hypervisor 2. virtual machine manager (VMM)
Disadvantages of cloud computing include:
1. local laws and regulations about the physical location of a cloud data center 2. accidental exposure of sensitive data between one company's applications and another's on a multitenant system 3. being tied to a specific cloud vendor 4. concerns that the cloud vendor may go out of business
The mobile cloud system include:
1. mobile devices themselves 2. mobile operators (e.g., Verizon and AT&T) 3. transmission paths 4. Web sites mobile device users interact with
advantages of cloud computing include:
1. rapid installation of security patches 2. more experienced personnel 3. better monitoring of system integrity, performance and security.
_______________________ is a corporate goal of ensuring that the computer resources and applications of an organization remain operating to sustain the day-to-day business functions of the organization.
Business continuity
_________________ is a term that describes the way an organization controls its operations and processes to adhere to corporate mandates, laws, and ethical standards.
Corporate governance
Most virtualization software uses a layer of program instructions beneath the operating system called the master.
False: its called hypervisor
One popular PaaS offering is _______________________. This service is free for smaller applications and provides support for Web page hosting, data storage, the Java and Python programming languages, and software development environments.
Google App Engine (GAE).
Apache Hadoop projects concerned with distributed databases is called__________
HBase
______________allows developers to create multimedia pages for mobile users, which is a great advantage since such devices typically do not display____________.
HTML5 flash content
The goal of this software is to provide scalability, reliability and rapid processing performance.
Hadoop
______________ is a software framework that provides for distributed processing of large sets of data (i.e., "big data") across a network of servers.
Hadoop
Apache Hadoop projects concerned with data warehousing is called_______________
Hive
These measures can include configuring their incoming Internet gateways and firewalls to deny access based on ___________________.
IP addresses, ports, or packet types.
________________ is that portion of corporate governance that controls the use of IT resources.
IT governance
_________services are able to provide load balancing of Web requests from clients, to keep servers from becoming overloaded with heavy Web traffic, and this is another issue the organization doesn't need to worry about.
IaaS
The ______________________ cloud-based service, although not one of the cloud service models, helps an organization coordinate its users' access to a number of its different applications.
Identity as a Service (IDaaS)
The _________________________ service model requires that an organization take on even more responsibility than the PaaS service model.
Infrastructure as a Service (IaaS)
Linux operating system, Apache Web Server, MySQL database management system, and Perl, PHP, or Python programming languages, is referred to ________________________.
LAMP
Apache Hadoop projects concerned with data mining is called ___________.
Mahout
______________notes the constant increase of memory capacity and computing speed over time.
Moore's Law
Apache Hadoop projects concerned with parallel programming and computation is called __________________.
Pig
The________________________ service model puts more control, and more responsibility, with an organization since it must develop and deploy its own applications.
Platform as a Service (PaaS)
With _____________, files, or parts of files, are redundantly written to multiple disks, so that if one physical disk drive fails the files on it can easily be reconstructed.
RAID
One of the major IaaS service providers is _________________.
Rackspace
__________________ attacks occur when a hacker enters SQL queries to retrieve data into a Web form and the Web site executes the query to provide a list of valid users or other compromising information, allowing the hacker to continue the penetration of the system.
SQL-injection
_______ defines a site's or application's ability to use additional resources on demand.
Scalability
____________________ provides greater CPU utilization, smaller equipment footprint, less power consumption, and support for multiple operating systems.
Server virtualization
________________________software is popular among organizations since a single username and password allows users to access all of their servers and applications, some of which might be cloud-based.
Single sign-on (SSO)
three service models for cloud computing
Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS)
Infrastructure as a Service (IaaS) makes available all of the computing hardware resources (such as processors and drives) and the customers are responsible for installing and maintaining software.
True
______ occurs when a provider does not support data export or when a provider's services are unavailable through others.
Vendor lock-in
______________ is a type of virtualization that allows physical disk drives, file systems, or databases to be treated as logical unit.
Virtual storage
________________________ is when a physical computing resource is configured to provide two or more virtual resources.
Virtualization
_______ is a term used to describe the set of tools and Web sites that allow users to publish content to the Web without the direct use of HTML.
Web 2.0
A ____________________________file describes a Web service and its methods.
Web Service Description Language (WSDL)
Available Web services are described via the ____________________and the ________________________ framework provides a directory of published and available Web services.
Web Services Descriptor Language (WSDL) Universal Description, Discovery, and Integration (UDDI)
Apache Hadoop projects concerned with coordination of distributed applications is called __________________.
ZooKeeper
Big data
a term applied to the massive quantity of data that organizations can collect from their operation and that cannot be easily managed by traditional database systems.
To achieve greater productivity, an organization's applications can be programmed to utilize Web services, which are pre-written Web-based programs made available to consumers that can be used to return a specific type of data using an ___________________________.
application programming interface (API).
Organizations usually have a _________________that outlines their goals for productivity, profit, customer satisfaction, employee morale, and other factors
business strategy
One strategy to minimize cloud costs is called __________________. In this scenario the application uses on-site resources most of the time, but when a peak demand period occurs, it is extended into the cloud for additional resources.
cloud bursting
________________allows an organization to track accounts, manage contracts and sales leads, perform forecasting, utilize analytics, organize mass e-mails, and utilize dashboards
customer relationship management (CRM) SaaS services
Using ______________________cloud vendors provide users with the ability to mount virtual logical devices in the cloud that actually exist as one or more physical storage devices.
data storage virtualization
ince disk space used by one organization on a cloud storage device will probably be used by another, a good security practice for cloud vendors is to use ______________ of the previously-used storage area after an organization is done using it.
data wiping
A ____ is a hacker attack on a site, the goal of which is to consume system resources so that the resources cannot be used by the site's users.
denial-of-service
Cloud vendors should also put measures in place to minimize __________________ and ______________________attacks on their servers.
denial-of-service (DoS) distributed denial-of-service (DDoS)
A ________________________________is a detailed plan created by a company to ensure that its systems and data can be brought back online after a natural disaster.
disaster recovery plan (DRP)
As with the SaaS service model, the PaaS service model gives ______________to the organization since it can scale services up or down based on what is needed and when.
elasticity
A DRP typically includes such things as:
emergency contact information for personnel, extensive risk identification, a risk analysis, and detailed risk migration plans.
Ideally, the modules within a program should be tightly coupled.
false: Ideally, separate modules of a problem should be loosely coupled since this makes them more independent and more widely usable by applications.
A ____________________s is conducted prior to beginning any actual development on a project, including gathering requirements, in order to see that there is adequate justification to begin a project, support from management, and adequate funding.
feasibility analysis
Behind the scenes SSO may use ________________________technology and __________________________to exchange a user's security credentials across different servers.
federated identity management (FIDM) Security Assertion Markup Language (SAML)
By establishing__________________________, perhaps at different locations, cloud vendors, with their huge processing and storage hardware resources, can help protect their clients' dat
hardware and software redundancy
______________________helps alleviate a single point of failure scenario and provides additional server resources.
hardware redundancy.
Capability Maturity Model (CMM) and the Capability Maturity Model Integration (CMMI) process were developed to____________________
help an organization measure how well it is achieving its goals, there are five levels of maturity ranging from 1 (Initial) to 5 (Optimized)
Because Web services can be called from a number of different computer programming languages they have high ___________________________ and this also facilitates reusability.
interoperability
Cloud computing
is a solution that allows organizations to obtain hardware and software services via the Internet as needed in a cost-effective manner
An organization may require a combination of cloud services for their business and they can do this via a ___________.
mashup
hybrid cloud
model consists of a mixture of multiple private, public and/or community cloud types.
private cloud
model is set up for only for a single organization. This configuration provides the greatest level of security but is the most expensive option. A private cloud may be located locally at the organization or remotely.
community cloud
model provides services for multiple organizations that have similar interests. Like a private cloud, a community cloud may be located locally at a member organization or remotely.
public cloud
model provides services to essentially all organizations. This configuration provides the lowest level of security but is the least expensive option. A public cloud is located remotely from the organization.
With an SaaS environment multiple users may be sharing the same hardware and databases in what is referred to as a ______________________.
multitenant solution.
The ability to purchase cloud services ______________results in a better, ___________ strategy than estimating what on-site resources are needed and then finding out later that they are inadequate or mostly idle.
on demand right-sizing
five characteristics of cloud computing
on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service
Secure connections are required at the cloud vendor site to minimize _____________________________ hacker activities.
packet sniffing and man-in-the-middle
A program calls a Web service by passing one or more _________________ to the service over the Internet.
parameters
IaaS service vendors provide either dedicated _________________ to customers, at a greater cost, or ______________, for less cost, that may be shared with other customers.
physical servers virtual servers
Since server virtualization allows a single server to be used as multiple servers to service different customer applications, ______________________cloud vendors can achieve greater overall CPU utilization than having a single server frequently sit idle.
platform as a service (PaaS)
The four deployment models for cloud computing are
private cloud public cloud community cloud hybrid cloud
The ________________ is the ratio of the organization's income to revenue.
profit margin
A ____________can be added to the network to provide additional security for the Web server.
proxy server
But because it can take some time to restore lost data, especially from a tape-based backup system, an additional approach is the use of a _________________________system.
redundant array of independent disks (RAID)
Once a project has a go-ahead to begin, then the ________________ phase begins.
requirements analysis
A major way to measure the effectiveness of a purchase is the ______________________. This is a ratio of the income or savings divided by the cost of the item.
return on investment (ROI)
Usually an organization will perform a ____________________of its hardware and software to determine the support needed based upon the probability of it failing.
risk assessment
Software as a Service (SaaS)
service model is a way that an organization can access cloud-based software and its data by simply using a browser. (Email and other COD apps) THINK - Consume
Platform as a Service (PaaS)
service model provides developers with servers, operating systems, databases, development tools, and networking so that an organization doesn't have to manage this hardware itself. (Used for app development) THINK - Build on it
Infrastructure as a Service (IaaS)
service model provides the physical hardware to an organization, but the organization is then required to install the operating systems, databases, and other software. (all you get is a hardware landing place) THINK - Migrate to it
A _____________________ describes in detail the level of service and support a vendor promises to provide to an organization.
service-level agreement (SLA
When you sign an agreement with a cloud service provider, the ____________ typically includes MTBF, uptime percentage, throughput, and other performance benchmarks the provider must meet.
service-level agreement (SLA)
A ________________ is an enterprise architecture composed of Web services.
service-oriented architecture (SOA)
Web services are a key component of a _____________________________.
service-oriented architecture (SOA).
IT projects are developed using a series of phases called the ___________________________.
system development life cycle (SDLC
Because a cloud vendor may go out of business, or become unacceptable to the organization over time, the organization may demand that a______________________hold a copy of the cloud vendor's source code, so that, if necessary, a new cloud vendor can be used in the future and make use of the original vendor's processing.
third-party escrow company
The _________________ includes all the direct and indirect costs of an item, such as a server.
total cost of ownership (TCO)
To help increase the delivery time of Web content from the cloud, a ______________________ may be added to the network between the user and a Web site in the cloud to reformat the content to optimize it for a mobile device.
transcoder
Companies using the cloud normally pay only for the resources they consume.
true
PaaS solutions eliminate the need to buy and maintain hardware as well as the need to install and manage operating-system software.
true
Some benefits of _______________ include simplicity, operating system independence, easier deployment and maintenance, improved compatibility, security management, and clienteles.
virtual networks