What are the 4 characteristics of cloud computing? - ✔✔ Broad network access
On-demand services
Resource Pooling
Measured or "metered"
... [Show More] service
What NIST publication number defines cloud computing? - ✔✔ 800-145
What ISO/IEC standard provides information on cloud computing? - ✔✔ 17788
What is another way of describing a functional business requirement? - ✔✔ necessary
What is another way of describing a nonfunctional business requirement? - ✔✔ not necessary
What is the greatest driver pushing orgs to the cloud? - ✔✔ Cost savings
What is cloud bursting? - ✔✔ Ability to increase available cloud resources on demand
What are 3 characteristics of cloud computing? - ✔✔ Elasticity
Simplicity
Scalability
What is a cloud customer? - ✔✔ Anyone purchasing cloud services
What is a cloud user? - ✔✔ Anyone using cloud services
What are the three cloud computing service models? - ✔✔ SaaS(Software as a service)
PaaS(Platform as a service)
IaaS(Infrastructure as a service)
What is IaaS (Infrastructure as a Service)? - ✔✔ Cloud provider provides all the physical capability and administration, while the customer is responsible for logical resources.
What is PaaS (Platform as a Service)? - ✔✔ A cloud computing service that provides the hardware and the operating system and is responsible for updating and maintaining both.
What is SaaS (Software As A Service)? - ✔✔ Cloud provider manages everything.
What are the four cloud deployment models? - ✔✔ Public
Private
Community
Hybrid
What cloud model is owned by a single organization? - ✔✔ Private
What cloud model is an arrangement of two or more cloud servers? - ✔✔ Hybrid
What cloud model is a shared setup between orgs? - ✔✔ Community
What cloud model is open for free usage? - ✔✔ Public
What is a cloud service provider? - ✔✔ Cloud service provider manages and provides entire hosting ability
What is a Cloud Access Security Broker? - ✔✔ Third-party acting as an intermediary for identity and access management
What do regulators do? - ✔✔ Ensure organizations are in compliance with regulatory framework.
What word in the CIA triad describes: What protects information from unauthorized access/dissemination? - ✔✔ Confidentiality
What word in the CIA triad describes: Ensuring that information is not subject to unauthorized modification? - ✔✔ Integrity
What word in the CIA triad describes: Ensuring that authorized users can access the information when they are permitted to do so? - ✔✔ Availability
What is a cloud architect? - ✔✔ Expert in cloud computing
What is cloud os also known as? - ✔✔ PaaS
NIST standard number that lists accredited and outmoded cryptosystems - ✔✔ FIPS 140-2
customer may be unable to leave, migrate, or transfer to an alternate provider due to technical or non-technical constraints. - ✔✔ vendor lock-m
What is cloud migration? - ✔✔ Process of transitioning part of a company's data or services from onsite premises to the cloud
What is cloud portability? - ✔✔ Move applications and data between cloud providers
What offers a degree of assurance that nobody w/o authorization will be able to access other's data? - ✔✔ Encryption
If a cloud customer wants a secure, isolated sandbox in order to conduct software development and testing, which cloud service model would probably be best? - ✔✔ PaaS
What technology has NOT made cloud service viable? - ✔✔ Smart hubs [Show Less]