allows for the rapid provisioning and deprovisioning of cloud resources
ELASTICITY
List the three primary cloud service models
Software as a Service, Platform as a Service, and Infrastructure as a Service
You have been tasked with creating Request for
Information documents. Search the Internet for a
Request for Information (RFI) template. List the
components the template includes.
Project introduction, objectives, required information, selection criteria, and timeline.
What are the two best examples of access and control
policies?
User account management and network access for personal devices.
One of your co-workers is investigating industry
compliancy and the top cloud service providers and
wants to know where to get started. What resources
can you suggest?
Each of the major CSPs has a web page dedicated to compliancy information, so those pages would be a good place to start.
is the designing of cloud services to be able to increase or decrease virtual machine CPU and RAM amounts (vertical scaling) or to add or remove virtual machines (horizontal scaling) to support an IT workload
SCALABILITY
List the usual target audience for each of the three cloud service models
Software as a Service—end users
Platform as a Service—developers, database administrators
Infrastructure as a Service—administrators
Your organization recognizes the need for a content
delivery network (CDN) to better supply
documentation and training videos to customers.
Because your organization has never hosted a CDN, you are unsure exactly what sort of solution is required. Which type of business proposal should you draft?
Request for Proposal, because your organization has a service need but is unsure how to fulfill the need.
What best describes an incident response policy?
A step-by-step process for managing a security incident.
What best describes data sovereignty?
Data stored in the cloud falls under the legal and regulatory authority of the country where it is hosted.
means cloud users can provision and deprovision cloud resources using a GUI, command-line tools, or programmatically through API calls.
SELF-SERVICE
What are the four primary deployment models?
Private, Public, Community, and Hybrid
After receiving several Request for Proposal
responses from potential vendors, you are ready to
narrow the list of potential candidates. The cloud
deployment steering committee wants to know
exactly how the CDN will be deployed and what the
associated costs will be. What sort of business
proposal should you draft?
Request for Quote, because your organization is ready to choose a vendor and needs to know the cost.
What best describes change management?
A systematic approach to managing organizational changes.
What best describes risk acceptance?
Taking no further action to mitigate a risk because the consequences are acceptable.
allows a multitude of device types to access cloud services over a network
BROAD NETWORK ACCESS
What are the responsibilities of the cloud service
provider in the shared security model? Of the
consumer?
The cloud service provider is responsible for security of the cloud. The consumer is responsible for security in the cloud.
One of the managers on your company’s cloud
migration team has been approached by a company
that specializes in administering cloud services on
behalf of companies like yours. What kind of company is this?
A cloud-managed service provider..
Do you think that change management procedures
will need to be updated at your organization for SaaS
deployments?
It is very likely that change management procedures will need modification
What are the four risk responses?
Mitigate, accept, avoid, transfer.
means cloud consumers pay only for the cloud resources they use.
PAY-AS-YOU-GO
An organization needs a cloud service model that
supports Python for the development team. Which of the three cloud service models is the best choice?
Platform as a Service.
How might an IaaS solution help developers who
need a test server to quality control (QC) a new web application?
Administrators can provide a virtual machine template that includes the hardware specifications the developers need as well as automation scripts to install any necessary applications. Developers can then build these virtual machines on their own whenever needed in a self-service, on-demand manner.
A co-worker has asked you about the upcoming
cloud migration. This individual is responsible for
writing procedures for the IT department and wants
to know if the software deployment SOP will need to
be updated. How do you respond?
The SOP will certainly need to be updated to reflect changes to software and infrastructure deployments.
List the five steps of risk assessment.
1. Determine the hazard(s); 2. Identify who or what could be harmed; 3. Evaluate risks and develop mitigation strategies; 4. Document the risk findings and mitigation; 5. Review the risk assessment regularly.