ITC 583 - Cloud Computing

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/54

flashcard set

Earn XP

Description and Tags

ITC 583

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

55 Terms

1
New cards

Pay-per-use monitor

Measures the usage of a cloud-based IT resource by a given cloud consumer for billing purposes

2
New cards

Failover system

increases reliability and availability by using established clustering tech to provide redundant implementations of software program

3
New cards

Multi-device broker

Software program that contains mapping logic capable of transforming message data to and from different data formats

4
New cards

Automated scaling listener

Service agent that monitors communication between cloud service consumers and providers for dynamic scaling purposes

5
New cards

Audit monitor

Used to collect tracking data for networks in support of regulatory and contractual obligations

6
New cards

Hypervisor

Fundamental part of virtualization infrastructure used to generate virtual server instances of a physical server

7
New cards

SLA monitor

Observes the runtime performance of cloud services to ensure that they are fulfilling the contractual QoS requirements

8
New cards

Resource cluster

Used to group multiple IT resource instances so that they can be operated as a single IT resource

9
New cards

XML Gateway

Transmits and validates XML data

10
New cards

Cloud storage gateway

Transforms cloud storage protocols and encodes storage devices to facilitate data transfer and storage

11
New cards

State management database

Storage device that is used to temporarily persist state data for software programs

12
New cards

Asymmetric distribution

Larger workloads are issued to IT resources with higher processing capacities

13
New cards

Workload prioritization

Workloads are scheduled, queued, and discarded according to their priority levels

14
New cards

Content-aware distribution

Requests are distributed to different IT resources as dictated by the request content

15
New cards

Capacity planning

Process of determining and fulfilling future demands of an orgs It resources, products, and services

16
New cards

Lead strategy

adding capacity to an IT resource in anticipation of demand

17
New cards

Lag strategy

adding capacity when the It resource reaches its full capacity

18
New cards

Match strategy

adding IT resource capacity in small increments, as demand increases

19
New cards

Clustering

Group of independent IT resources that are interconnected and work as a single system

Decreases system failure and increases availability and reliability

20
New cards

Grid computing

Computing resources are organized into one or more logical pools

Pools are collectively coordinated to provide high performance distributed grid

Grid is loosely coupled and distributed

Heterogeneous and geographically dispersed resources

Features of network access, resource pooling, and scalability and resiliency in both grid and cloud computing

21
New cards

Virtualization

Creates virtual instances of IT resources

Allows physical IT resources to provide multiple virtual images of themselves so underlying processing capabilities can be shared by multiple users

22
New cards

Cloud

Distinctive IT environment that is designated for the purpose of remotely provisioning scalable and measured IT resources

23
New cards

Horizontal

Allocating or releasing of resources that are the same type

Allocation of resources is scaling out

Releasing is scaling in

24
New cards

Vertical

When an existing IT resource is replaced by another with higher or lower capacity

Replacing resource with another of higher capacity is scaling up

Replacing with lower capacity resource is scaling down

25
New cards

Cloud service owner

Person or organization that legally owns a cloud service

26
New cards

Cloud resource admin

Person or org responsible for administering a cloud based IT resource

Can be cloud consumer or cloud provider

27
New cards

Cloud auditor

third party that conducts independent assessments of cloud environments

28
New cards

Cloud brokers

role that has responsibility of managing and negotiating the usage of cloud services between cloud consumers and cloud providers

29
New cards

Cloud carrier

party responsible for providing the wire level connectivity between cloud consumers and cloud providers

30
New cards

Org boundary

Represents the physical perimeter that surrounds a set of IT resources that are owned and governed by an org

31
New cards

Trust boundary

Logical perimeter that typically spans beyond physical boundaries to represent the extent to which IT resources are trusted

32
New cards

On-demand usage

Consumer has freedom to self-provision resources

33
New cards

Ubiquitous access

Ability for a cloud service to be widely accessible

Can support a range of devices, transport protocols, interfaces, and security tech

34
New cards

Multitenancy (and resource pooling)

Enables an instance of the program to serve different customers whereby each is isolated from the other

Resources can be dynamically assigned and reassigned according to consumer demands

35
New cards

Elasticity

Automated ability of a cloud to transparently scale resources

36
New cards

Measured usage

Ability of a cloud to keep track of usage of resources

37
New cards

Resiliency

Form of failover that distributes redundant implementations of resources across physical locations

38
New cards

Infrastructure-as-a-service(IaaS)

Represents a self-contained IT environment compromised of infrastructure-centric resources that can be accessed and managed via cloud

Can include hardware, network connectivity, OS, and other resources

Purpose to provide cloud consumers with a high level of control responsibility over configuration and utilization

Usually not pre-configured placing consumer as admin

39
New cards

Platform-as-a-service(PaaS)

Pre-defined ready to use environment comprised of already deployed and configured IT resources.

Relies on the usage of a ready made environment that establishes a set of pre-packaged products and tools used to support the entire delivery lifecycle of custom apps

Consumer does not have admin burden

40
New cards

Software-as-a-service (SaaS)

Software positioned as a shared cloud service made available as a product or generic utility represents the typical profile of software service offering

Software can be leased and used for different purposes and via different terms

Very little admin control

41
New cards

Public cloud

Publicly accessible cloud environment owned by a third party cloud provider

42
New cards

Community cloud

Like a public cloud but its access is limited to a specific community of cloud consumers

43
New cards

Private cloud

Single org cloud owner

44
New cards

hybrid cloud

includes two or more private, public, or community clouds, but each cloud remains separate and is only linked by technology that enables data and application portability

45
New cards

After you build a container, what software do you use to handle container deployment?

docker

46
New cards

What newer architecture goes hand-in-hand with docker and provides a new and highly scalable way to design software?

Microservices Architecture

47
New cards

Docker file defines an image

true

48
New cards

Docker container makes switching between versions of software trivial

true

49
New cards

Containerization provides instant app portability

true

50
New cards

Containers are short lived in a production environment

true

51
New cards

Docker container includes the host kernel

false

52
New cards

Docker container includes an entire operating environment including dependencies and databases

true

53
New cards

Docker orchestration tool

Kubernets, swarm, mesosphere

54
New cards

Logical network perimeter

Purpose to isolate a group of related cloud=based IT resources that may be physically distributed

Used to isolate IT resources in cloud from non-authorized users, non-users, and cloud consumers

Created by virtual firewalls and virtual networks

55
New cards

Multi-tenancy

Allows several tenants to access the same app logic simultaneously

Offers interface specialization, customization depending on business processes, and access control