Identifying Cloud Service Models: Newoutlook - It
Identifying Cloud Service Models: Newoutlook - It
support an IT workload.
Self-service means cloud users can provision and
deprovision cloud resources using a GUI,
command-line tools, or programmatically through
API calls.
Broad network access allows a multitude of device
types to access cloud services over a network.
Pay-as-you-go means cloud consumers pay only
for the cloud resources they use.
Availability ensures that cloud-based IT systems
and data are always available. The cloud SLA
provides uptime guarantees.
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
SELF TEST
The following questions will help you measure your
understanding of the material presented in this chapter.
As indicated, some questions may have more than one
correct answer, so be sure to read all the answer choices
carefully.
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
A. Service availability
B. Limited user base
C. Security of data at rest
D. Responsibility for infrastructure
9. Your on-premises network is linked to a cloud-
based virtual network through a VPN tunnel. What
type of cloud deployment model is this?
A. Hybrid
B. Private
C. Public
D. Extended
10. Which of the following is a true statement?
A. Anybody with Internet access can potentially
access public cloud services.
B. Anybody with Internet access can potentially
access private cloud services.
C. Private clouds are available to any user with a
paid subscription.
D. Public clouds are used by a single organization.
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
A. Horizontal scaling
B. Managed service
C. Vertical scaling
D. Infrastructure as a Service
12. You have manually deployed an Ubuntu Linux
virtual machine in the public cloud. Who is
responsible for applying Linux operating system
updates to the VM?
A. Cloud service provider
B. Cloud tenant
C. Ubuntu
D. Cloud service provider and cloud tenant
13. Which type of hypervisor requires an existing
operating system?
A. Type 1
B. Type 2
C. Type 3
D. Type 4
14. Which statements regarding cloud computing are
correct? (Choose two.)
A. Virtualization relies on cloud computing.
B. Cloud-hosted virtual machines normally run on
type 2 hypervisors.
C. Cloud computing relies on virtualization.
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
Chapter 2
The Business Side of Cloud
Computing
CERTIFICATION OBJECTIVES
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
Two-Minute Drill
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
COMPUTING
Cloud computing has become wildly popular.
Individuals and organizations benefit from using
computing services running on somebody else’s
equipment for a small usage fee—small, at least, in
comparison to running those same services on your own
equipment in your own facility that you must also
manage. But the cost really is about more than just the
direct fees. For example, are IT services deployed more
efficiently? Is customer service improved? Answering
such questions is described as proof of value (PoV).
Cloud adoption begins with mapping available cloud
services to computing needs and conducting proof of
concept (PoC) pilots to ensure chosen cloud services
work as expected. This can include software developers
using automated testing for quality assurance (QA)
purposes in the cloud or using cloud-based file share
folders to address file access needs. Instead of manually
provisioning cloud resources, such as virtual machines
and databases, cloud users can also use templates
(essentially blueprints) to quickly create or even
manage cloud resources over and over again.
Cloud computing is a collection of IT solutions that is
of interest not only to the organization’s chief
technology officer (CTO) but also to the chief financial
officer (CFO) since there is a potential reduction in up-
front, large IT investments.
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
Chargeback
SLAs define not only cloud service availability but also
the related pricing structure. In some organizations, this
even applies to a private cloud. The IT department
provides the private cloud services, and each department
within the organization is charged for its use of private
cloud resources (departmental chargeback).
Tracking cloud resources based on details such as
department or project is easily accomplished with
resource tagging, which means adding metadata to
further define that resource. For example, deploying
storage, virtual machines, and websites in the cloud
means deploying numerous cloud resources, each of
which might be tagged with a “Project” tag with a value
of “Project ABC,” as shown in Figure 2-3. This way, all
cloud resources related to “Project ABC” can be listed
together to facilitate management and billing allocation.
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
Licensing
Most open-source software does not require users to
pay for licenses. Open source means the source code is
freely available to anyone on the Internet, and any
modifications to the source code must be made freely
available to all users on the Internet. Examples of
popular open-source software include the Ubuntu Linux
operating system and the LibreOffice productivity suite.
The opposite of open-source software is proprietary
software. An example is Microsoft Windows; Microsoft
owns the Windows OS source code and does not make it
freely available for modifications. Also, most proprietary
software requires a fee for licensing the software.
Most CSPs offer a bring your own license (BYOL)
option when deploying resources such as virtual
machines or databases, as shown in Figure 2-5. If your
organization has already paid licensing fees, you can
continue to use them in the cloud to reduce costs. When
configuring an OS and supplying license information,
you’ll normally have to accept the End User Licensing
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
EXERCISE 2-1
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
instance type.
4. Scroll down and enter 40 in the Hours field.
5. Scroll back up to the very top of the web page and
click the Storage Accounts tile. Scroll down to the
Storage Accounts section and review the default
settings, but do not change any of the Storage
Account settings.
6. Scroll back up to the very top of the web page and
click the Azure SQL Database tile.
8. From the Backup Storage Tier drop-down list,
choose RA-GRS.
9. Scroll down to the very bottom of the web page to
view the estimated monthly cost for all the
selected cloud products.
EXERCISE 2-2
1. Sign in to https://portal.azure.com.
2. From the search field at the top center of the Azure
portal, type Subscriptions and click the search
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
CERTIFICATION SUMMARY
This chapter discussed how to bridge the gap between
the business side of computing and the details related to
cloud computing service delivery.
You have been exposed to the difference between
CAPEX and OPEX and how cloud managed services
allow cloud technicians to focus on the business
problem instead of the underlying IT complexities.
You also learned how ITIL relates to the cloud and
how SLAs define expected cloud service levels and
pricing structures. This chapter covered how cloud
resource tagging facilitates organizing cloud resources
for billing purposes.
Saving money is always important; strategies such as
virtual machine auto-shutdown and the use of spot
instances can help achieve this. Finally, you learned
about cloud subscriptions and licensing options.
TWO-MINUTE DRILL
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
SELF TEST
The following questions will help you measure your
understanding of the material presented in this chapter.
As indicated, some questions may have more than one
correct answer, so be sure to read all the answer choices
carefully.
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
B. Pay-as-you-go
C. CAPEX
D. Managed service
3. Which two terms are the most closely related to
ITIL?
A. Service delivery
B. Supplier management
C. Service level agreement
D. Managed service
4. From the cloud customer’s perspective, to which
business role does the CSP apply?
A. Cloud tenant
B. Regulator
C. Supplier
D. Enforcer
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
A. Reserved instances
B. Cloud pricing calculator
C. Cloud templates
D. Billing alerts
13. What should you configure to control which types
of virtual machines can be deployed in the cloud?
A. Cloud policies
B. Cloud template
C. Cloud SLA
D. Cloud subscription
14. Your company has a three-year military contract
that will require the use of many virtual machines
that must be left running all the time. You need to
minimize cloud computing costs. Which cloud
virtual machine option should you consider?
A. Spot instances
B. Reserved instances
C. Auto-shutdown
D. Template deployment
15. Which type of software does not normally charge
users for licensing?
A. CAPEX
B. Open source
C. Proprietary
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
D. BYOL
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
Part II
Cloud Design Requirements
CHAPTERS
3 Cloud Planning
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
Chapter 3
Cloud Planning
CERTIFICATION OBJECTIVES
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
Two-Minute Drill
CLOUD FEASIBILITY
Like all business endeavors, the adoption of cloud
computing requires careful analysis, planning, and
testing. Formulating a solid business plan and
identifying how business needs are addressed by
technology play important roles in a successful cloud
adoption strategy. When assessing the feasibility of
extending IT services beyond existing on-premises
solutions, an organization needs to identify the potential
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
Feasibility Study
A feasibility study factors in items such as technical
constraints, regulatory compliance, and cost to
determine whether a proposed solution has a realistic
chance at succeeding.
Documentation can aid in determining how realistic
and practical (feasible) a proposed cloud computing
solution will be in addressing business needs. As
discussed in Chapter 1, CSP service level agreements
(SLAs) define expected uptime for specific cloud
services. CSP compliance web pages show which
security and data privacy standards the CSP supports.
Network and data flow diagrams are important in
showing how IT systems and data will interact with one
another, such as using a site-to-site VPN tunnel to link
on-premises IT services to a public CSP service. Other
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
Change management
Resource management
Configuration management
Standard operating procedures
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
in Figure 3-1.
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
IP address
Street address
Mother’s maiden name
Blood type
Prescribed medications
Past medical procedures
Health insurance coverage
Medical procedure payment history
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
Large Datasets
If you have large on-premises datasets, your cloud
migration strategy might include employing CSP large
data transfer services such as AWS Snowball. With AWS
Snowball, a secured storage device is sent to your
location, your data is copied (with 256-bit encryption) to
the device, and the device is shipped back to AWS,
where the data is then copied into the AWS cloud.
Transferring very large amounts of data (think
petabytes) over the Internet sometimes is not feasible,
even with the fastest Internet connections, because it
would take too long. It might also be too expensive or
not sufficiently secure.
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
EXERCISE 3-1
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
CERTIFICATION SUMMARY
This chapter discussed factors to consider when
planning the adoption of cloud computing services.
You have been exposed to the importance of ensuring
that CSP service offerings address business needs. A
business gap analysis assesses the current state of a
business process and the desired state. A technical gap
analysis identifies the current technical configuration of
a current solution compared to the desired
configuration to efficiently support business processes.
If a feasibility study determines that a proposed cloud
solution can realistically succeed in meeting business
needs, then further detailed testing is done on a small
scale via pilot programs, which test exactly how feasibile
proposed cloud solutions are.
You learned how planning the use of cloud services
includes determining how deployed cloud solutions will
be monitored to ensure the best performance and
security possible. Alerts can be configured so that
notifications of detected anomalies are sent to cloud
administrators.
You also learned about sensitive individual data and
data privacy in the cloud and how related laws and
regulations can influence the use and configuration of
cloud services. You learned that personally identifiable
information (PII) refers to any individual or
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
TWO-MINUTE DRILL
Cloud Feasibility
A cloud feasibility study determines whether or
not cloud computing can address business needs.
Cloud pilot programs implement proposed cloud
solutions on a small scale; results must be
analyzed to determine success or failure before
deploying on a larger scale.
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
SELF TEST
The following questions will help you measure your
understanding of the material presented in this chapter.
As indicated, some questions may have more than one
correct answer, so be sure to read all the answer choices
carefully.
Cloud Feasibility
1. You need to perform a general analysis to
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
B. Feasibility study
C. Gap analysis
D. Cloud migration
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
D. AWS Snowball
8. Which of the following is most closely related to
sensitive medical information?
A. PHI
B. PII
C. COTS
D. SLA
9. Which data privacy standard is a legislative act of
the European Union?
A. HIPAA
B. PCI DSS
C. GDPR
D. COTS
10. Your manager instructs you to deploy cloud-stored
data only within Canada. Which term best describes
this scenario?
A. Disaster recovery planning
B. Load balancing
C. Service level agreement
D. Data sovereignty
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
to a virtual machine?
A. V2V
B. V2P
C. P2P
D. P2V
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
Chapter 4
Compliance and the Cloud
CERTIFICATION OBJECTIVES
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
Two-Minute Drill
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
Type of industry
Physical location of the organization
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
Citizenship of clients
Location of physical compute equipment
Location of transmitted and stored data
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NIST SP 800-53
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
ISO/IEC 27017:2015
The International Standards Organization (ISO) and
International Electrotechnical Commission (IEC)
standard 27017:2015 is titled “Information Technology –
Security Techniques – Code of Practice for Information
Security Controls Based on ISO/IEC 27002 for Cloud
Services.” That’s a long title, but why is it relevant?
ISO/IEC 27017:2015 is relevant because it focuses on
the use of effective security controls to mitigate cloud
computing risk. Your chosen CSP should be certified by
an ISO certifying agent for the proper use of CSP
security controls. But remember the notion of shared
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
FedRAMP
The Federal Risk and Authorization Management
Program (FedRAMP) applies primarily to U.S. federal
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
Sarbanes-Oxley Act
Financial scandals related to companies such as
WorldCom and Enron received extensive media
coverage in the early 2000s. These types of questionable
accounting practices and falsification of financial
documents led to the creation of the Sarbanes-Oxley
(SOX) Act in 2002.
SOX requires public organizations to follow strict
rules for accounting and financial document reporting.
What does this have to do with the cloud? Organizations
affected by SOX who use cloud services must use a CSP
that adheres to the Statement on Standards for
Attestation Engagements (SSAE) No. 16. SSAE No. 16 is
an auditing standard that deals with reporting on
security controls within service organizations such as
CSPs and their data centers.
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
Data Artifacts
Deleted data, even from on-premises disks, is often
retrievable using freely available tools, especially if the
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
(overwrite) types.
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
Degaussing
Data is removed when the storage media is
near a strong magnetic field
Not applicable to optical storage media or solid
state drives (SSDs)
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
EXERCISE 4-1
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
CERTIFICATION SUMMARY
This chapter focused on ensuring that your organization
remains compliant with related laws and regulations
when using cloud services. When depending on a CSP,
an organization should perform due diligence to ensure
that the CSP adheres to relevant laws, regulations, and
security standards.
The discussion began with a review of how laws and
regulations such as HIPAA and PCI DSS can apply to
CSPs and cloud customers. An example is where
sensitive data is collected, stored, and used. Next, we
discussed how laws define general rules, but regulations
focus on the details, including how the law is
implemented and enforced.
Next, security standards frameworks such as NIST SP
800-53 and FedRAMP were discussed in the context of
cloud computing, both from the CSP and cloud
customer perspectives.
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
TWO-MINUTE DRILL
Laws, Regulations, and Security Standards
Laws are general guidelines for controlling
behavior.
In the business world, regulations provide the
implementation and enforcement details for laws.
The physical location of servers and data can
determine which laws are applicable.
HIPAA is an American law protecting sensitive
patient medical information.
PCI DSS is not a law, but rather an industry-based
security standard designed to protect cardholder
data.
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
computing.
FedRAMP provides security guidelines for U.S.
government agency use of cloud computing.
The Sarbanes-Oxley Act imposes accounting and
financial reporting requirements for publicly
traded U.S. companies, the purpose of which is to
mitigate financial reporting falsehoods to protect
the public, including investors.
SELF TEST
The following questions will help you measure your
understanding of the material presented in this chapter.
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
A. Drilling
B. Shredding
C. Hammering
D. Degaussing
13. Compared to vulnerability assessments, which
word is most closely associated with penetration
testing?
A. Documentation
B. Authentication
C. Active
D. Passive
14. To prevent future sensitive data retrieval of cloud-
replicated data, you have repartitioned a hard disk
within a laptop computer. The computer was
running a Windows client operating system at the
time of the repartitioning. Which statement
regarding this scenario is correct?
A. A Windows server operating system should
have been used.
B. Deleted partitions are easily recovered.
C. A Linux server operating system should have
been used.
D. The operating system cannot be running when
disk partitions are removed.
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
TWO-MINUTE DRILL
Storage Media
HDD-based cloud storage is slower than SSD-
based cloud storage but is less expensive.
SSD-based cloud storage is best suited for
intensive disk I/O usage.
Disk IOPS is a measurement of disk throughput; a
higher value means better performance.
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
1433.
Access by NoSQL databases such as MongoDB
occurs over TCP port 27017.
Database Transaction Units (DTUs) are a
performance unit consisting of vCPUs, amount of
RAM, and disk IOPS.
SELF TEST
The following questions will help you measure your
understanding of the material presented in this chapter.
As indicated, some questions may have more than one
correct answer, so be sure to read all the answer choices
carefully.
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
Storage Media
1. You are planning how cloud storage will address
business needs. Choosing which cloud storage
option will have the largest positive impact on
performance?
A. Capacity
B. Storage media brand
C. Solid state drives
D. FTP access
2. Which data storage characteristic is the most
closely related to minimizing data redundancy?
A. IOPS
B. Replication
C. Deduplication
D. RAID
3. Which RAID configuration improves disk I/O
performance but does not include fault tolerance?
A. RAID 0
B. RAID 1
C. RAID 5
D. RAID deduplication
4. Which solution protects stored data even if
physical storage devices are stolen?
A. Deduplication
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
B. RAID 1
C. RAID 5
D. Encryption of data at rest
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
B. Geo-redundant storage
C. Deduplication
D. RAID 1
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
D. Regulatory compliance
15. You are configuring a CDN that will be used to
serve media files to users. What should you
configure to use the CDN most efficiently?
A. Increased TTL
B. Reduced TTL
C. Wildcard path for media files
D. Custom encryption keys
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
space consumption.
A, B, and D are incorrect. Disk IOPS is a disk
I/O throughput measurement. Replication creates
copies of data for increased resiliency to failure at a
primary location. Redundant Array of Independent
Disks (RAID) organizes multiple disk storage
devices together in various ways to improve disk
performance and/or to provide fault tolerance.
3. A. RAID 0, disk striping, uses multiple physical
disks working as one to improve performance, but
the failure of a single disk renders the entire disk
array unavailable.
B, C, and D are incorrect. RAID 1 (disk
mirroring) and RAID 5 (disk striping with
distributed parity) both provide fault tolerance.
RAID deduplication is not a function specifically
related to RAID; deduplication is a method of
reducing disk space consumption.
4. D. Encrypting data at rest protects stored data.
The correct decryption key is required to read
information that is encrypted.
A, B, and C are incorrect. Deduplication is a
method of reducing disk space consumption. RAID
1 (disk mirroring) and RAID 5 (disk striping with
distributed parity) both provide disk fault tolerance.
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
disk.
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
TWO-MINUTE DRILL
Cloud Network Components
Cloud customers can connect to public CSPs over
the Internet or through a private dedicated
network circuit.
Redundant Internet cloud connections should be
used in case one connection fails.
Dedicated network circuits provide predictable
bandwidth on a private network link.
Microsoft Azure dedicated network links are called
ExpressRoute circuits.
Amazon Web Services dedicated network links are
called Direct Connect dedicated connections.
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
Network Protocols
Traditional on-premises network protocols are also
used in the cloud.
SSH uses TCP port 22 for network device, Unix,
and Linux remote management.
RDP uses port TCP 3389 for Windows host remote
management.
Cloud services are primarily accessible over HTTP
(TCP port 80) and HTTPS (TCP port 443).
LDAP uses TCP port 389 when connecting to a
network configuration database.
SNMP uses UDP port 161 when monitoring
network devices.
DNS uses UDP port 53 for client requests.
DNS uses TCP port 53 for server-to-server
communication.
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
SELF TEST
The following questions will help you measure your
understanding of the material presented in this chapter.
As indicated, some questions may have more than one
correct answer, so be sure to read all the answer choices
carefully.
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
C. Anonymous
D. Updates
6. Which type of VPN links two networks together
over the Internet?
A. Point-to-site
B. Branch-to-branch
C. Client-to-site
D. Site-to-site
7. Which common VPN type links a single device to a
private network over the Internet?
A. Point-to-site
B. Branch-to-branch
C. Client-to-site
D. Site-to-site
Network Protocols
8. You need to configure your on-premises perimeter
firewall to allow outbound Linux remote
management. Which port should you open?
A. TCP 80
B. UDP 161
C. TCP 22
D. TCP 3389
9. Your Microsoft Azure virtual machine has been
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
Internet connections.
A, C, and D are incorrect. None of the options
are correct because nothing needs to be done.
3. D. A subnet is created within a cloud-based
virtual network to allow cloud resources to
communicate on the network. The subnet IP
address range must fall within the cloud-based
virtual network address space.
A, B, and C are incorrect. A public IP address is
used to provide connectivity to cloud resources over
the Internet. VPNs provide encrypted tunnels
between two endpoints over an untrusted network
such as the Internet. Load balancing distributes
incoming client app requests among a pool of back-
end servers supporting the app.
4. B. Classless Inter-Domain Routing (CIDR)
notation uses an IP network address prefix followed
by a slash and the number of bits in the subnet
mask.
A, C, and D are incorrect. Software-defined
networking (SDN) hides the underlying
complexities of network device configuration from
the cloud user. VPNs provide encrypted tunnels
between two endpoints over an untrusted network
such as the Internet. Quality of service (QoS)
provides a reasonable guaranteed level of network
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
Network Protocols
8. C. Remote management of Linux hosts is
normally performed using Secure Shell (SSH) over
TCP port 22.
A, B, and D are incorrect. TCP port 80 is used
by HTTP, UDP port 161 is used by SNMP, and TCP
port 339 is used for Windows host remote
management using RDP.
9. C. The most likely culprit of the listed items is
that www.site.com is down.
A, B, and D are incorrect. Custom DNS server
references are not part of Azure VNet default
settings. Connecting to a website uses TCP port 80
or 443, not TCP port 22, which is used for SSH.
Azure virtual machines can resolve Internet names
if the configuration allows it.
10. A. Windows host remote management occurs
over TCP port 3389.
B, C, and D are incorrect. HTTPS uses TCP port
443, the Server Message Block (SMB) file-sharing
protocol uses TCP port 445, and LDAP uses TCP
port 389.
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
TWO-MINUTE DRILL
Virtualization in the Cloud
Hypervisors run virtual machines.
Virtual desktop infrastructure (VDI) provides user
desktops over a network from a central
virtualization server.
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
High-Performance Computing
HPC is also referred to as big compute and parallel
processing.
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
SELF TEST
The following questions will help you measure your
understanding of the material presented in this chapter.
As indicated, some questions may have more than one
correct answer, so be sure to read all the answer choices
carefully.
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
C. VDI
D. VLAN
3. Which type of hypervisor is also called a bare metal
hypervisor?
A. Type 1
B. Type 2
C. Type 3
D. Type 4
4. Which virtual machine characteristic determines
the amount of compute power?
A. Autoscaling
B. Load balancer
C. Sizing
D. Tagging
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
High-Performance Computing
11. You are the cloud technician for a pharmaceutical
research company. Currently, researchers are
analyzing vast datasets on premises, but the
analysis results are taking too long to generate.
What should you propose to speed up analysis
results while minimizing IT costs?
A. CSP
B. CDN
C. HPC
D. SDN
12. Which word is the most closely related to HPC in
the cloud?
A. Security
B. Clustering
C. NoSQL
D. Template
13. You plan on configuring a cloud HPC cluster to
analyze terabytes of climate modeling data. What is
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
High-Performance Computing
11. C. High-performance computing uses groups of
virtual machine nodes to run complex tasks for
large datasets.
A, B, and D are incorrect. A cloud service
provider (CSP), content delivery network (CDN), or
software-defined networking (SDN) does not
provide the means to analyze large datasets.
12. B. High-performance computing (HPC) uses a
cluster of virtual machines to process complex tasks
in parallel.
A, C, and D are incorrect. Security, NoSQL, and
templates are not as closely related to HPC as the
term “cluster” is.
13. C. Before an HPC cluster can process vast
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
Blockchain
A blockchain is a publicly transparent digital ledger
of transactions (a collection of blocks) that cannot
be modified.
Each block (list of transactions) contains details
such as date and time stamps, financial values, the
current block’s unique hash, and the previous
block’s unique hash.
A blockchain is decentralized, meaning it is stored
across many computers.
A smart contract is added to the blockchain and
can automate the execution of contract details,
such as payments to intellectual property owners.
The blockchain is chronological and updated every
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
ten minutes.
Blockchain updates occur only after a consensus
has been reached among blockchain nodes about
the validity of the blocks.
Cryptocurrency refers to digital assets consisting
of any commodity that has value, such as Bitcoins,
intellectual property, or contracts.
Cryptocurrency miners are computers or groups of
computers with a large amount of compute power
that are used to validate blockchain transactions.
Cryptocurrency is not controlled by governments
or financial institutions.
Application Containers
Images contain application files and settings.
Images do not contain operating system files.
Images are contained in either private or public
repositories where new images can be uploaded
and existing images can be downloaded,
depending on permissions.
Images are portable, meaning they can easily be
moved to other hosts running application
containerization software such as Docker.
Containers are run-time instances of images.
Containers start up very quickly because they use
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
SELF TEST
The following questions will help you measure your
understanding of the material presented in this chapter.
As indicated, some questions may have more than one
correct answer, so be sure to read all the answer choices
carefully.
Service-Oriented Architecture
1. Which of the following terms is most closely
associated with the term “microservice”?
A. Encryption
B. Machine learning
C. Modular
D. Blockchain
2. You have developed a microservice that can pass
messages to other microservices even if they are
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
Blockchain
5. Which blockchain characteristic prevents the
modification of past transactions?
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
A. Hashing
B. Encryption
C. Immutability
D. Decentralization
6. Which piece of data uniquely identifies a
blockchain block?
A. Block size
B. Miner node name
C. Date and time stamp
D. Hash
7. How often is a blockchain on the Internet updated?
A. Every minute
B. Every five minutes
C. Every ten minutes
D. Every hour
Application Containers
8. Which of the following is designed to run
application containers?
A. CMS
B. Docker
C. Blockchain
D. Machine learning
9. How are container images and containers related?
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
D. Message queue
13. Your company has vast amounts of medical
research data that needs to be analyzed to predict
future health patterns. Which cloud solution should
you implement?
A. Machine learning
B. Artificial intelligence
C. Blockchain
D. Internet of Things
14. Which of the following terms is the most closely
associated with machine learning?
A. Blockchain
B. Application container
C. Image registry
D. Training model
15. Which of the following are benefits derived from
the use of machine learning? (Choose two.)
A. Establishing baselines
B. Predicting outcomes
C. Deploying VMs
D. Recognizing patterns
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
Blockchain
5. C. When something is immutable, it cannot be
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
Application Containers
8. B. Docker is software running on a Windows-
based or Linux-based host that can run and manage
application images and containers.
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
TWO-MINUTE DRILL
Software Development in the Cloud
DevOps combines software development and IT
operations to deliver high-quality solutions as
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
efficiently as possible.
The use of software development solutions in the
cloud falls under the PaaS cloud service model.
Application programming interfaces (APIs) are
collections of functions for a hardware device or a
software solution.
Software developers can call upon APIs to execute
hardware or software functions defined in the
API.
Software developers can create and host APIs in
the cloud.
Software components communicate over common
protocols such as HTTP/S and SMTP.
Extensible Markup Language (XML) is a common
data exchange format that uses tags to describe
data.
JavaScript Object Notation (JSON) uses key–value
pairs to define data.
Software Testing
Sandboxing is used in the IT world to isolate
development and testing environments from
production environments.
There are various sandboxing solutions, such as
network isolation, VMs with limited network
connectivity, and application containers.
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
deployment.
SELF TEST
The following questions will help you measure your
understanding of the material presented in this chapter.
As indicated, some questions may have more than one
correct answer, so be sure to read all the answer choices
carefully.
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
D. HTML
4. You are planning the creation of a custom line of
business software that will be hosted in the cloud.
You plan on using the Java programming language
to code the solution. Using which of the following
will most greatly facilitate this endeavor?
A. API
B. XML
C. SDK
D. PKI
Software Testing
5. Which type of software testing applies an above-
average workload to an application?
A. Vulnerability
B. Penetration
C. Load
D. Compliance
6. You have configured automated cloud-based code
builds and testing. One configured test ensures that
new code changes have not adversely affected other
code modules. What type of testing is this?
A. Fuzz
B. Vulnerability
C. Regression
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
D. Penetration
7. A custom application consists of multiple
microservices. You need to test code changes made
to one microservice. Which of the following
presents the fastest and most efficient sandboxing
solution?
A. VMs
B. APIs
C. Containers
D. Fuzzing
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
Software Testing
5. C. Load testing applies an above-average
workload to an application in order to determine
application security and stability.
A, B, and D are incorrect. Vulnerability testing
identifies security weaknesses. Penetration testing
identifies and attempts to exploit discovered
weaknesses. Compliance testing is used to ensure
compliance with standards, laws, or regulations.
6. C. Regression testing ensures that changes
have not adversely affected other components or
functionality not related to the change.
A, B, and D are incorrect. Fuzz testing provides
random and unanticipated data to an application.
Application behavior is then observed to determine
its security and stability. Vulnerability testing
identifies security weaknesses. Penetration testing
identifies and attempts to exploit discovered
weaknesses.
7. C. Application containers consist of application
files and settings. Each microservice comprising a
larger application can run within its own container.
This allows container code updates, testing, and
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
and securely.
9. A. Checking out code from a code repository
prevents other software developers from modifying
that checked-out code.
B, C, and D are incorrect. The listed statements
regarding checked-out code are not correct.
10. B and C. Automation can be configured with
some code repositories, such as automatically
building and testing code when it is checked in.
A and D are incorrect. Virtual machine
deployment and template creation are not common
examples of code repository check-in actions.
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
TWO-MINUTE DRILL
Confidentiality
Confidentiality protects sensitive data from
unauthorized users.
PKI certificates can be used to implement
confidentiality and can be issued to users, devices,
and software.
PKI certificates contain public–private key pairs.
Data confidentiality security controls can apply to
data storage and network communications.
Data encryption feeds data into an encryption
algorithm along with an encryption key.
More bits in an encryption key generally means
better encryption strength.
Unencrypted data is referred to as plain text, and
encrypted data is referred to as ciphertext.
Symmetric encryption uses the same key for
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
Availability
Availability security controls ensure that IT
services and data are continuously accessible.
Cloud service level agreements (SLAs) include
details about service availability.
Network attacks such as DoS and DDoS attempt to
render systems unavailable for legitimate use.
IT system and data availability can be achieved
through data backups, replication, and
redundancy.
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
authentication.
Multifactor authentication (MFA) combines
authentication categories such as “something you
know” and “something you have.”
Data labeling can be used to further control
(authorize) access to sensitive data.
SELF TEST
The following questions will help you measure your
understanding of the material presented in this chapter.
As indicated, some questions may have more than one
correct answer, so be sure to read all the answer choices
carefully.
Confidentiality
1. Which of the following is the most closely related
to data confidentiality?
A. Hashing
B. Digital signature
C. Encryption
D. Authentication
2. You need to secure a cloud-hosted web application
using HTTPS. What is required to accomplish this?
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
A. PKI certificate
B. SSL certificate
C. TLS certificate
D. IPSec certificate
3. You have decided to use your own key to encrypt
and decrypt data stored in the cloud. Which type of
encryption is this?
A. PKI
B. Symmetric
C. Asymmetric
D. TLS
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
Availability
8. Which of the following is the most closely related
to data availability?
A. Encryption
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
B. Backups
C. Digital signatures
D. Authentication
9. A malicious attacker uses a compromised host to
attack a web server virtual machine, causing it to
crash. Which type of attack is this?
A. Ransomware
B. Directory traversal
C. DoS
D. DDoS
10. A malicious attacker uses a network of
compromised hosts to attack a web server virtual
machine, causing it to crash. Which type of attack is
this?
A. Ransomware
B. Directory traversal
C. DoS
D. DDoS
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
Availability
8. B. Data backups are related to availability.
A, C, and D are incorrect. Encryption is a form
of confidentiality that protects sensitive data from
unauthorized users. Digital signatures are used to
ensure message authenticity. Authentication is the
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
users.
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
TWO-MINUTE DRILL
Risk Management
An organization that is planning to adopt cloud
computing can engage the professional services of
IT consulting firms to create a Request for
Proposal (RFP) aligning cloud services with
business needs.
The use of cloud services introduces business
dependencies on the CSP and ISP.
Risk assessments begin with identifying assets,
followed by assigning asset owners, asset labeling
and sorting by value, threat identification and
prioritization, security control efficacy review, and
security control modification or implementation.
Security controls require period reviews to ensure
they continue to be effective against constantly
evolving threats.
A risk register is a central list of organizational
assets and related threats, with a threat likelihood
rating value.
Risk acceptance means engaging in an activity and
acknowledging related risks while not mitigating
those risks.
Risk transfer shifts some or all risk to a third
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
Threat Mitigation
Security controls are used to mitigate threats.
Standard operating procedures (SOPs) ensure the
consistent management of cloud resources.
Security policies define how an organization uses
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
SELF TEST
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
Risk Management
1. What is the first step in a risk assessment?
A. Threat identification
B. Threat prioritization
C. Asset identification
D. Vulnerability scanning
2. Which type of risk treatment acknowledges the risk
associated with an activity and takes no corrective
action?
A. Acceptance
B. Transfer
C. Avoidance
D. Mitigation
3. Which type of risk treatment spreads the risk out
to a third party, such as a cloud service provider?
A. Acceptance
B. Transfer
C. Avoidance
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
D. Mitigation
4. Your company backs up on-premises files to the
cloud to ensure data availability. To which risk
treatment is this scenario most closely related?
A. Acceptance
B. Transfer
C. Avoidance
D. Mitigation
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
assets?
A. Logging
B. Tagging
C. Auditing
D. Vulnerability scanning
Threat Mitigation
8. You need to address security concerns related to
how your organization stores sensitive data.
Current data protection measures have been
deemed inadequate. What should you consult to list
current data protection controls?
A. Risk register
B. SIEM
C. SLA
D. Audit file
9. Which term is used to describe general security
requirements related to asset security?
A. Security control
B. Control objective
C. Risk register
D. SIEM
10. Which disaster recovery term refers to the average
amount of time required to recover a failed
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
component or service?
A. SLA
B. DRP
C. IRP
D. MTTR
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
B. Fuzz
C. Vulnerability
D. Regression
14. Which type of testing only identifies security
weaknesses?
A. Penetration
B. Fuzz
C. Vulnerability
D. Regression
15. Which type of testing actively exploits discovered
weaknesses?
A. Penetration
B. Fuzz
C. Vulnerability
D. Regression
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
Threat Mitigation
8. A. A risk register is a centralized list of assets,
threats, and controls.
B, C, and D are incorrect. Security information
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
||||||||||||||||||||
||||||||||||||||||||
NEWOUTLOOK.IT
Technet24
||||||||||||||||||||