What are the steps to Cloud Hardening Practices?
What are the (4) Cloud Hardening Isolate steps?
What do we isolate?
What are the (2) Cloud Hardening Secure steps?
What do we Secure?
What is Due Diligence with Cloud? (4)
Which of the following is the BEST way to mitigate the security and privacy issues associated with cloud computing?
A. Allowing only cloud administrators to have access to cloud resources
B. Removing firewalls and access control routers from the network
C. Implementation and enforcement of a comprehensive security policy
D. Removing virtualized hardware from the organization
C. Implementation and enforcement of a comprehensive security policy
Purpose of FEDRAMP CONOPS? (3)
Which of the following is a definition of virtualization?
A. Virtualization is a method to organize servers in a more efficient manner to double the number of
accessible users
B. Virtualization is a set of techniques for hiding software resources behind hardware abstractions.
C. Virtualization is a set of techniques for hiding hardware resources behind software abstractions.
D. Virtualization is a method to structure data in a more efficient manner with less cost to the user.
C. Virtualization is a set of techniques for hiding hardware resources behind software abstractions.
How does scalability work with cloud computing?
A. Servers and storage can be added quickly.
B. Servers and storage can be released quickly.
C. Users can be added and removed quickly.
D. All of the above is correct.
D. All of the above is correct.
Which of the following can be deployed by a cloud provider to reduce storage costs?
A. Journaling file systems
B. Two-factor authentication
C. Data de-duplication
D. Data encryption
C. Data de-duplication
What are Cloud Service Subscribers leading practices for Hardening (5)?
Top SLA Factors(14)?
Key Attribute of Cloud Networking (5)?
Which of the following can cause user response times to deteriorate?
A. High CPU usage and low network bandwidth
B. High network latency and high volume of data stored
C. Low network bandwidth and high network latency
D. Low network bandwidth and high volume of data stored
B. High network latency and high volume of data stored
What is SDN?
Software Defined Netwkg
What Protocol does SDN use?
OpenFlow Protocol
How does SDN work?
Why is it popular?
Control is decoupled from hardware (where traffic destination occurs) and given to SW application called controller
Leading practices SDN?
Warnings or issues with SDN?
Security Advantages of Virtualization?(3)
Virtual Infrastructure (Best Practices)?
Use basic principals like:
What are the (6) Greatest Virtualization Attack Vectors ?
How does Hyper-V occur?
Vulnerability: Escalation of Privilege function parameter in hyper call from existing running VM to hyper-visor
How does VM Escape occur?
Breaking out of VM w/ host OS
How does VLAN Attacks occur?
Attacking Network resources on VLAN (VLAN hopping) by Switch Spoofing / Double Tagging. Fix Switch port config.