What is the primary function of cloud computing organizations?
Primary function is to provide on-demand access to computing resources and services over the internet vs. organizations purchasing their own hardware and software
Corporations usually follow a pay-as-you-go model with the cloud provider.
What concept is central to the operation of a cloud provider?
Virtualization
This allows multiple virtual machines (VMs) to run on physical servers.
Fill in the blank: In public cloud services, the storage is private among users, but the networking and compute resources may be _______.
shared
This sharing of resources distinguishes public clouds from private clouds.
What is software-defined networking?
SDN is a network architecture approach that separates the control plane, which makes decisions about how data packets should be forwarded, from the data plane, which is responsible for moving the packets through the network
It allows for quick distribution of configurations for multiple virtual or physical network devices via automation.
What is a Virtual Private Network (VPN) primarily used for?
Encrypted connection/tunnel between a business and a cloud presence
VPNs are essential for secure data transfer, especially when relocating data centers to the cloud.
What is a hypervisor?
Hypervisor is a type of computer software, firmware, or hardware that creates and runs virtual machines (VMs)
It acts as an intermediary between the physical hardware and the OS, providing a virtual operating platform, as well as, managing the execution of multiple VMs on a single physical machine.
What can virtual machines (VMs) run on?
VMs emulate physical devices and function as fully operational standalone environments.
What functions can be simulated by software in cloud computing?
These functions replace physical hardware components.
What is the primary function of a cloud gateway?
Cloud gateway is a network access point that securely connects on-premises infrastructure to cloud environments, acting as a bridge for data, protocols, and security policies.
It allows customers to access their cloud services and enables outbound connections to the Internet.
Fill in the blank: The cloud gateway requires a public _______ address for connection.
IPv4 and IPv6
Public addresses are routable on the Internet, while private addresses are used within the cloud network.
What does NFV stand for and what does it do?
Network Functions Virtualization; detaches network functions from proprietary hardware and runs them as software-based instances on standard servers or VMs
Examples of Virtualized Network Functions include: routers, firewalls, load balancers, WAN optimizers, IDS and NAT
What are some advantages of NFV?
Advantages include:
NFV reduces the need for physical devices.
What is a Virtual Private Cloud (VPC)?
VPC a logically isolated section of a cloud provider’s infrastructure, creating a private, secure environment dedicated to a single customer within a public cloud
Resources are isolated from other customers in the public cloud infrastructure
What is the purpose of subnets in a VPC?
To separate the resources of one network from the resources of other networks in the shared environment
Subnets enhance security and organization within the VPC.
What are the three tiers of VPC architecture?
Each tier serves a distinct function within the VPC.
What is the database tier in a VPC?
Database tier is the backend layer responsible for storing and managing application data. The storage tier for data in the virtual private cloud
It is separated under its own subnet for security.
What is the application tier in a VPC?
Application tier is responsible for processing user requests and implementing the application’s functionality. The tier level where computing resources and applications run
It acts as a bridge between the presentation tier (user interface) and the database tier
What is the presentation tier in a VPC?
Presentation tier also known as the web or user interface (UI) layer. It serves as the entry point for users interacting with an application; the tier level where customers configure their cloud environment
What are the two main types of network security configurations?
Security Lists are applied at the subnet level, while NSGs can be applied to specific resources within a virtual network.
What is the difference between network security groups and network security lists?
Network security lists apply to entire subnets, meaning the rules defined in a security list affect all resources within that subnet, providing subnet-level security control.
NSGs allows more granular, per-instance control over traffic, regardless of the subnet they belong to. NSGs also create a virtual firewall for individual VMs, entire subnets or grouped resources with similar security needs
Additionally, NSGs are stateful, automatically allowing return traffic for permitted connections, while Security Lists are stateless, requiring explicit rules for both inbound and outbound traffic
True or false: Network Security Lists allow for more granular control compared to Network Security Groups (NSGs).
FALSE
NSGs provide more granular control as they can be applied to specific resources rather than the entire subnet.
True or false: Public clouds require users to manage their own security infrastructure.
FALSE
Public cloud providers have dedicated security teams and built-in security measures.
What are the three models of cloud computing?
Each model offers different levels of control and management over the computing resources.
What is the responsibility of the individual or company renting hosting space in Infrastructure as a Service (IaaS)?
The customer is responsible for ensuring the security of their data and infrastructure when using IaaS.