Head in the Clouds
Virtual Reality
Drive and Ambition
Controlling the Cloud
Monitor the Monitor
100

This cloud provides both private and public cloud services

Hybrid cloud

100

This 3-letter type of migration moves a physical environment to a virtual environment

P2V

100

A large object of binary data that is stored as a single entity

BLOB

100

A VPN protocol that encrypts traffic using SSL/TLS

SSTP

100

Two of the most common alerting methods

SMS and SMTP

200

This environment should ensure that every interaction that takes place in the cloud, whether physical or logical, is secured

Private Cloud

200

Software layer that emulates hardware resources to the guest operating system

Hypervisor

200

Additional data that such as on a HTML file that describes characteristics of a stored object

Metadata

200

The term for masking data to hide its values is ______

Obfuscation

200

Default mode on a firewall

Implicit Deny

300

This is NOT a network isolation method implemented in a cloud environment

Physical

300

Like the Lincoln, this protocol protects a private communication stream between two endpoints

VPN Tunneling

300

This type of drive allows for variable-length objects and containers with no physical size limitations

HDD

300

Resource ______ allows applications to operate with virtually infinite resources, including data storage, bandwidth, and memory

Pooling

300

A(n) ______ is automatically sent by a system resource to notify of a fault, failure, or potential issue

Alert notification

400

Two choices for a the location of a cloud deployment

On and Off Premises

400

This planning method ensures that a virtual environment is able to accommodate current and future needs

Capacity planning

400

This type of storage typically consists of a single dedicated hardware device to emulate a  file server that provides file sharing services over NFS or CIFS

NAS

400

This method can allow cloud service providers to verify and control resource licensing utilization

Device fingerprinting

400

The process of reducing the attack surface of a host or server is

Hardening

500

This method of responsibility is split between the cloud service provider and the cloud service subscriber

Accountability

500

This automates the management, application, and facilitation of the elements in a cloud infrastructure to meet the computing needs of a business or organization

Orchestration

500

Sharing part of its name with the Moon, this code that identifies a specific block of data storage or a group of blocks on a disk drive

LUN

500

This process specifically manages the submission, recording, analysis, decision-making, and approval of changes


Change control

500

What is the 4-letter service that CSPs provide to clients in order to set baselines and thresholds usually through a performance monitoring software

MaaS