Cloud Computing Concepts Flashcards

Day22_Summarizing Cloud Concepts (58 cards)

1
Q

What is the primary function of cloud computing organizations?

A

Primary function is to provide on-demand access to computing resources and services over the internet vs. organizations purchasing their own hardware and software

Corporations usually follow a pay-as-you-go model with the cloud provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What concept is central to the operation of a cloud provider?

A

Virtualization

This allows multiple virtual machines (VMs) to run on physical servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fill in the blank: In public cloud services, the storage is private among users, but the networking and compute resources may be _______.

A

shared

This sharing of resources distinguishes public clouds from private clouds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is software-defined networking?

A

SDN is a network architecture approach that separates the control plane, which makes decisions about how data packets should be forwarded, from the data plane, which is responsible for moving the packets through the network

It allows for quick distribution of configurations for multiple virtual or physical network devices via automation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Virtual Private Network (VPN) primarily used for?

A

Encrypted connection/tunnel between a business and a cloud presence

VPNs are essential for secure data transfer, especially when relocating data centers to the cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a hypervisor?

A

Hypervisor is a type of computer software, firmware, or hardware that creates and runs virtual machines (VMs)

It acts as an intermediary between the physical hardware and the OS, providing a virtual operating platform, as well as, managing the execution of multiple VMs on a single physical machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What can virtual machines (VMs) run on?

A
  • Linux
  • macOS
  • Windows
  • Applications
  • Router software
  • Switching software
  • Custom configurations

VMs emulate physical devices and function as fully operational standalone environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What functions can be simulated by software in cloud computing?

A
  • Routers
  • Firewalls
  • Load balancers

These functions replace physical hardware components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the primary function of a cloud gateway?

A

Cloud gateway is a network access point that securely connects on-premises infrastructure to cloud environments, acting as a bridge for data, protocols, and security policies.

It allows customers to access their cloud services and enables outbound connections to the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fill in the blank: The cloud gateway requires a public _______ address for connection.

A

IPv4 and IPv6

Public addresses are routable on the Internet, while private addresses are used within the cloud network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does NFV stand for and what does it do?

A

Network Functions Virtualization; detaches network functions from proprietary hardware and runs them as software-based instances on standard servers or VMs

Examples of Virtualized Network Functions include: routers, firewalls, load balancers, WAN optimizers, IDS and NAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some advantages of NFV?

A

Advantages include:

  • Runs on generic servers
  • Simplified configuration and management
  • On-demand changes to the network

NFV reduces the need for physical devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Virtual Private Cloud (VPC)?

A

VPC a logically isolated section of a cloud provider’s infrastructure, creating a private, secure environment dedicated to a single customer within a public cloud

Resources are isolated from other customers in the public cloud infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of subnets in a VPC?

A

To separate the resources of one network from the resources of other networks in the shared environment

Subnets enhance security and organization within the VPC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the three tiers of VPC architecture?

A
  • Database tier
  • Application tier
  • Presentation tier

Each tier serves a distinct function within the VPC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the database tier in a VPC?

A

Database tier is the backend layer responsible for storing and managing application data. The storage tier for data in the virtual private cloud

It is separated under its own subnet for security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the application tier in a VPC?

A

Application tier is responsible for processing user requests and implementing the application’s functionality. The tier level where computing resources and applications run

It acts as a bridge between the presentation tier (user interface) and the database tier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the presentation tier in a VPC?

A

Presentation tier also known as the web or user interface (UI) layer. It serves as the entry point for users interacting with an application; the tier level where customers configure their cloud environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the two main types of network security configurations?

A
  • Network Security Lists
  • Network Security Groups (NSGs)

Security Lists are applied at the subnet level, while NSGs can be applied to specific resources within a virtual network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the difference between network security groups and network security lists?

A

Network security lists apply to entire subnets, meaning the rules defined in a security list affect all resources within that subnet, providing subnet-level security control.

NSGs allows more granular, per-instance control over traffic, regardless of the subnet they belong to. NSGs also create a virtual firewall for individual VMs, entire subnets or grouped resources with similar security needs

Additionally, NSGs are stateful, automatically allowing return traffic for permitted connections, while Security Lists are stateless, requiring explicit rules for both inbound and outbound traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

True or false: Network Security Lists allow for more granular control compared to Network Security Groups (NSGs).

A

FALSE

NSGs provide more granular control as they can be applied to specific resources rather than the entire subnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

True or false: Public clouds require users to manage their own security infrastructure.

A

FALSE

Public cloud providers have dedicated security teams and built-in security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the three models of cloud computing?

A
  • Platform as a Service (PaaS)
  • Software as a Service (SaaS)
  • Infrastructure as a Service (IaaS)

Each model offers different levels of control and management over the computing resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the responsibility of the individual or company renting hosting space in Infrastructure as a Service (IaaS)?

A
  • Security of the infrastructure
  • Filtering incoming and outgoing data
  • Securing virtual machines in the cloud

The customer is responsible for ensuring the security of their data and infrastructure when using IaaS.

25
What are the **disadvantages of IaaS**?
* Versioning and upgrades * Security concerns * Legal considerations ## Footnote Users are responsible for maintaining their virtual machines and ensuring compliance.
26
What are typical uses for **Infrastructure as a Service (IaaS)**?
* Development and testing * Lift and shift migration * Web applications * High-performance computing ## Footnote IaaS allows users to manage virtual machines and customize their environments.
27
In **Infrastructure as a Service (IaaS)**, who is responsible for the total configuration of the machines?
The client ## Footnote The client manages the configuration of the computing and network resources.
28
True or false: PaaS requires significant investment in hardware and software before application development can begin.
FALSE ## Footnote PaaS provides the necessary infrastructure and tools, reducing upfront costs.
29
What are the **typical uses** for Platform as a Service (PaaS)?
* Development framework * Analytics and business intelligence * Application enhancements * Testing applications ## Footnote PaaS provides a cost-effective way to develop and test applications.
30
What are some **key features** of Platform as a Service (PaaS)?
* Pre-existing infrastructure * Dynamic infrastructure changes * Middleware for application development * Built-in analytical tools ## Footnote These features facilitate application development and deployment.
31
What does **Platform as a Service (PaaS)** provide?
* Pre-installed OS * Hardware infrastructure * Virtual environment for application development * Development tools and programming languages ## Footnote PaaS allows developers to create applications without managing the underlying infrastructure.
32
What is **Platform as a Service (PaaS)** used for?
To quickly develop applications without setting up servers and software ## Footnote It allows programmers to focus on development rather than infrastructure.
33
What is **Software as a Service (SaaS)**?
A software distribution model where applications are hosted by a third-party provider ## Footnote Users access the software via the Internet without needing to manage infrastructure.
34
What are some **characteristics of SaaS**?
* Multitenant architecture * Single shared software instance * Ease of management ## Footnote SaaS applications are maintained by the provider, reducing the burden on users.
35
In **Software as a Service (SaaS)**, what is provided to the user?
A fully developed product ## Footnote Users rent services like widgets for their applications without needing to develop them.
36
List some **advantages of public cloud**.
* Elasticity * Scalability * Cost efficiency * Quick service deployment ## Footnote Public cloud services can reduce costs for small to medium-sized businesses by eliminating hardware and maintenance expenses.
37
True or false: In a **private cloud**, the organization shares resources with other companies.
FALSE ## Footnote A private cloud is dedicated to a single organization, ensuring that resources are not shared with others.
38
True or false: A **private cloud** is always more cost-effective than a public cloud.
FALSE ## Footnote The cost-effectiveness depends on the duration and nature of the project.
39
What are the key features of a **private cloud**?
Key features include: * Single tenant * Dedicated resources * Proprietary architecture ## Footnote The private cloud is set up within an organization's own data center.
40
What is a **hosted private cloud**?
**Hosted private cloud** is a computing environment where a single organization **exclusively** uses dedicated servers hosted **off-premises** by a third-party cloud service provider ## Footnote The company manages the environment while the vendor provides the hardware.
41
List some **reasons organizations choose private clouds**.
* Service availability * Reduced security risks * Direct control over data ## Footnote Organizations may require data to remain in-house for regulatory or security reasons.
42
What is a **fully managed private cloud**?
**Fully managed private cloud** is a single-tenant cloud environment where a third-party provider is responsible for deploying, configuring, managing, and **maintaining the entire infrastructure**, including software, network, and operations. ## Footnote The vendor provides security, applications, and IT support for the organization.
43
What is a **hybrid cloud**?
A combination of private and public cloud designs ## Footnote It allows organizations to leverage both internal infrastructure and external cloud services.
44
What are the **advantages of hybrid clouds**?
* Scalability * Cost efficiency * Security * Flexibility ## Footnote Hybrid clouds allow organizations to scale resources quickly while maintaining control over sensitive data.
45
What are some **legal considerations** when hosting data in the cloud?
* Understanding how the cloud operates * Knowing where the company exists * Determining where the data is kept ## Footnote These considerations are crucial for compliance and data security.
46
What does **scalability** in cloud computing refer to?
**Scalability** in a cloud infrastructure means to dynamically adjust its resources—such as computing power, storage, and bandwidth—to meet changing workload demands ## Footnote This flexibility is a key benefit of cloud environments.
47
What are the **key features** of cloud scalability?
* Manual requests to the provider * Automatic scaling through software * Minimal disruption during scaling ## Footnote These features enhance the flexibility and efficiency of cloud solutions.
48
What is the concept of **cloud elasticity**?
**Cloud elasticity** is the ability of a cloud computing system to dynamically adjust its resources—such as CPU, memory, storage, and network bandwidth—in real time to match current and fluctuating demand ## Footnote It involves expanding and/or contracting computing, network, and storage resources based on demand.
49
What resources can be dynamically allocated in **cloud elasticity**?
* Storage resources * Processor resources * Network bandwidth ## Footnote These resources can change based on project, processes, or workflows and the adjustments are made in real-time
50
What are the **advantages** of cloud elasticity?
* Flexibility * High availability * Efficiency * Quick time to market ## Footnote These advantages allow for rapid adjustments to resource allocation based on demand.
51
What is a potential **disadvantage** of cloud elasticity?
Vendor lock-in ## Footnote Automated elasticity features can differ between vendors, making it hard to switch providers.
52
True or false: **Cloud elasticity** can lead to immediate resource allocation in response to demand.
TRUE ## Footnote This is a key benefit of cloud environments compared to physical infrastructures.
53
How does a **cloud provider** provision resources?
Resources are provisioned based on *need*, either **manually** or **automatically** ## Footnote Virtualization software monitors resource usage and can adjust resources accordingly.
54
What is **overprovisioning** in cloud environments?
**Overprovisioning** is allocating more computing resources than are typically required for normal operations ## Footnote This can lead to unnecessary costs since cloud services are pay-per-use.
55
What is **multitenancy** in cloud computing?
**Multitenancy** is a software architecture where a **single instance of a software application serves multiple tenants,** or user groups, with each tenant's data and configurations kept logically separated and secure ## Footnote This model allows for resource sharing while keeping customer data private.
56
What are typical uses for **multitenant clouds**?
* Email applications * Streaming services * Customer relationship management (CRM) ## Footnote These services utilize a single application shared among many users.
57
What are the **advantages** of multitenancy in cloud computing?
* Flexibility in adding/removing users * Enhanced security due to a small footprint * Cost savings from shared resources ## Footnote These advantages make multitenancy an efficient model for service delivery.
58
What is a **disadvantage** of a multitenant cloud?
Disadvantage includes: The potential for **security risks and data privacy issues**, as multiple customers share the same infrastructure, increasing the risk of unauthorized data access despite isolation techniques ## Footnote Additionally, there is a lack of customization | Users are limited to the configurations set by the service provider.