ITSS Hardware and infrastructure Study guide

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/159

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

160 Terms

1
New cards

Data Center

Large warehouses that store servers, storage, network, and various communication equipment used to manage IT operations. This acts as a support for an organization.

2
New cards

Servers

Run applications, process data and host websites or databases

3
New cards

Storage Equipment

Allows for the retrieval and deposit of data

4
New cards

Networking Equipment

Allows data flow between devices

5
New cards

Firewalls

A method of monitoring data traffic and can help protect against cyber attacks.

6
New cards

Support Infrastructure

Methods of making sure the data center is secure and operational; this includes Generators, Uninterruptible power supply, CCTV Camera, access controls, HVAC, and an operation staff.

7
New cards

Enterprise Data Center

Owned, built, and operated by the company. Allowing for more control and security, however, it is expensive to maintain and is limited in scalability.

8
New cards

Cloud-Based Data Centers

Operated over the internet and built using a CSP allows for on demand scalability, additionally, you can pay as you recieve service and can access from anywhere. However, if the internet fails then there's no service.

9
New cards

Colocation Data Center

Clients can rent out space for storage and the provider is responsible for maintaining the infrastructure. Usually more affordable, however, one needs to travel for access.

10
New cards

Managed Service Data Centers

Operated by a third party for a Company which can help reduce operational costs/burden, however, it's less flexible.

11
New cards

Data Center Design

Determining the business objectives and receiving consults to coordinate with the IT and Facility teams. Needing to consider Location, access, water and fuel, and safety.

12
New cards

ANSI/TIA-942

Telecommunications Infrastructure Standard for Data Centers

13
New cards

Uptime Institute Tiers

Levels of redundancy, availability, and fault redundancy

14
New cards

ISO/IEC 22237

International standard for data centers

15
New cards

ASHRAE TC9.9

Thermal and cooling management guidelines

16
New cards

BICSI 002

Best practices for data centers design and implementation

17
New cards

Availability

refers to the the actual time the data center is operational

18
New cards

Uptime

total time the data center is operational

19
New cards

Downtime

the total time the data center is not operational

20
New cards

Reliability

the ability for a data center to operate without interruptions

21
New cards

Redundancy

A backup to prevent or decrease downtime

22
New cards

N+1, 2N, 2N+1

A system used to determine the degree of redundancy

23
New cards

Preventive Maintenance

consistent check ins to prevent hardware failure; avoids wear and increases hardware life

24
New cards

Scheduled Maintenance

Set intervals to check on equipment regardless of condition

25
New cards

Predictive Maintenance

check ins are done to based on conditions of hardware and predicting failure based on data

26
New cards

CapEx (Capital Expenditure)

Costs associated with assets of the data center that are required for completion or militainment. Usually these are one time costs.

27
New cards

OpEx (Operational Expenditure)

Cost associated with running the data center on a daily basis. Usually reoccuring costs

28
New cards

Top-Down estimate cost

Uses data from past projects to estimate current project costs; estimates are quick but less accurately

29
New cards

Bottom-up estimate cost

Adds costs from individual components and tasks; takes longer for estimates but is more accurate

30
New cards

Parametric estimate cost

Uses past data and statistical models to estimate costs

31
New cards

Three-point estimate cost

Make 3 different estimates - an optimistic, pessimistic, and a most likely.

32
New cards

TCO (Total Cost of Ownership)

the cost of the data center throughout it's life time

33
New cards

ROI (Return on Investment)

Financial gain from investing into a data center

34
New cards

Payback Period

35
New cards

Encryption

converting data into a coded message using algorithms and keys

36
New cards

Plain Text

data before encryption

37
New cards

Ciphertext

Data after encryption

38
New cards

Stateful Packet Inspection

ensures that data packets received in response to internal request are permit

39
New cards

Data Confidentiality

Only authorized parties can access data

40
New cards

Data Integrity

Ensures that data hasn't been modified and comes from a trusted source

41
New cards

Data Availability

Ensures that data is accessible whenever

42
New cards

Data at rest

Data that is stored and encrypted

43
New cards

Data in Transit

Data that is in transit is also encrypted

44
New cards

Intrusion Detection System (IDS)

Detect or block suspicious traffic

45
New cards

Network Segmentation

A security technique that divides the network into segments

46
New cards

Principals of Least Privilege

a user is granted only the minimum permissions to do the job

47
New cards

Defense in Depth

using multiple overlapping security controls to protect a system

48
New cards

Seperation of Duties

critical tasks should be done by at least 2 people to prevent the compromise of a system

49
New cards

Zero Trust Model

Security model that treats everyone as a threat and consistently verifies.

50
New cards

Authentication

being able to prove identity

51
New cards

Authorization

resources used to prove their identification

52
New cards

Accounting

tracking the actions of the user

53
New cards

Something you are

fingerprints, retinal patterns, hand geometry

54
New cards

Something you have

ID badge, swipe card, OTP

55
New cards

Something you Know

passwords, account logon identifiers

56
New cards

Identify Federation

Allows customers to retain their on-premise credentials to access from cloud services from CSP

57
New cards

SSO (Single Sign-On)

Allows users to log in only once to access multiple applications

58
New cards

Discretionary Access Control (DAC)

the data owner decides who has permissions to the data

59
New cards

Mandatory Access Control (MAC)

Permissions are controlled by central authority and requires security labels

60
New cards

Role-Based Access Control (RBAC)

Permissions are tied to their job and do not receive more data than needed

61
New cards

Vulnerability scanning

process of discovering flaws or weaknesses in systems and applications by gathering information and attacking your own system to figure out weaknesses

62
New cards

Penetration testing

Attacking a system as if it was an outsider to document what attacks were successful, how the system was exploited, and how which vulnerabilities were utilized

63
New cards

Virtual firewall appliance (vFA)

Performs traffic filtering at the perimeter of the VPC

64
New cards

Network ACLs

specifies what traffic is allowed in and out of subnets

65
New cards

Security Groups

Control traffic to and from the individual VMs

66
New cards

Identity and Access Management (IAM)

Constantly making sure that there is no unauthorized users that can reach the data

67
New cards

Data protection

Enforce encryption whether the data is at rest or in transit

68
New cards

Monitoring and logging

Check user activity and identify who performed which action and monitoring solutions in a cloud environment

69
New cards

Compliance requirement

Organizations make sure their CSP can meet their data locality, privacy and security

70
New cards

Security testing and audit

Organizations must constantly check their system to make sure that their systems are not vulnerable

71
New cards

Multitenancy

an type of architect that CSP use where cloud users share resources without knowledge of one another

72
New cards

Vendor Lock-in

Reliance on proprietary software or tech that prevents organizations from adopting new forms of tech/software easily or without significant costs

73
New cards

Economies of scale

the relationship between the unit cost and the production volume

74
New cards

Organizational Agility

the ability for a business to adapt to new changes quickly in the market.

75
New cards

Vertical Scaling

Adding more resources to a server such as memory and processing power

76
New cards

Barrier to entry

the obstacles for a company to be competitive in a market

77
New cards

Microservices-based application

a type of architecture that breaks down applications into loosely coupled services that interact

78
New cards

Cloud Computing

An on demand delivery method of servers, storage, databases, apps, and other IT resources as a service

79
New cards

On-demand self-service

Users can automatically access resources as needed without needing human interaction

80
New cards

Broad Network access

Access to resources is available via end devices

81
New cards

Resource pooling

The CSP pools resources to server multiple people

82
New cards

Rapid Elasticity

Resources are able to be accessed or released to match demand

83
New cards

Measured service

Resource use is monitored, controlled and reported allowing for full transparency between the provider and consumer.

84
New cards

Public Cloud Deployment Model

Generally used for the public, it offers services via the internet and is very scalable and cost effective. Enterprises tend to not be in control of this data.

85
New cards

Private Cloud Deployment Model

Exclusively for a single organization and infrastructure is owned and managed by the organization. This method allows for better control and security of data but is more expensive and requires more expertise.

86
New cards

Hybrid Cloud Deployment Model

This method enables sensitive data to be sent through a private cloud and less sensitive data through a public cloud. This method is harder to manage but allows for better business alignment.

87
New cards

cloud bursting

When a private cloud's resources are exceeded it uses resources from the public cloud

88
New cards

Community Cloud Deployment Model

Infrastructure used by multiple organizations with shared concerns, usually owned by all the organizations involved

89
New cards

IaaS (Infrastructure as a Service)

allowing fundamental hardware resources to be used by system admins

90
New cards

SaaS (Software as a Service)

ready to use applications hosted in the cloud for end users

91
New cards

PaaS (Platform as a Service)

allows developers to make, test, and deploy applications over the cloud and not worry about infrastructure

92
New cards

Greatest barrier to entry for startups? What cloud deployment model should they use?

Capital and public cloud to reduce costs

93
New cards

What deployment cloud model should small to medium sized use?

These types of businesses might prefer hybrid clouds to have their sensitive data in a private cloud and less sensitive data in a public cloud

94
New cards

What type of deployment model should enterprises use?

Since enterprises usually have customers around the world, they are capable and SHOULD prefer private cloud models.

95
New cards

Rehosting (Lift and Shift)

Deploying all on-premise applications into an IaaS environment

96
New cards

Re-platforming

Optimizing the application without changing the core architecture

97
New cards

Repurchasing

Investing a transitioning into a cloud-native application

98
New cards

Re-architecting

Changing the core of the application to achieve better performance, scale, agility, and/or new features

99
New cards

Service Level Agreement (SLA)

Ensuring adequate availability of resources for everyone involved

100
New cards

Metadata

gives and stores information about data