1/32
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
Support 64-bit CPU operation at boot, a full GUI and mouse operation at boot, networking functionality at boot, and better boot security. A computer with UEFI may also support booting in a legacy BIOS mode
Unified Extensible Firmware Interface (UEFI)
The system setup program is accessed via a key combo during power-on (boot) process
UEFI/BIOS System Settings
enabling/disable/configure controllers and adapters including way of enforcing USB support
USB permissions
designed to prevent bootjacking where firmware uses crypto-keys from TPM to ID trusted code by checking OS boot loader
UEFI Secure Boot
SecureBoot Keys Microsoft, Fedora, OpenSUSE, and Ubuntu) will be
pre-loaded keys
HW storage of digital certificates, cryptographic keys, and password hashes, establishing a root of Trust and hard coded with unique, unchangeable endorsement key
Trusted Platform Module (TPM)
Secure device used to store cryptographic keys forming a root of Trust for system access
Hardware Security Module (HSM)
2-disk min, no redundancy or f/t due to striping across perf increase
RAID 0 Stripe
2-disk min as exact copies providing redundancy and f/t, no perf increase
RAID 1 Mirror
3-disk min redundancy,f/t, perf in speed - data striping across set w/parity allowing reconstruction on loss of 1 disk
RAID 5
4-disk min redundancy and fault-tolerance. Set divided into pairs where pair 1 mirror and pair 2 mirror and both pair-sets are striped
RAID 10 (1+0) Nested
HV Installs direct and manages hardware access w/out host OS so more resources to HV and guest OS's.
Type 1 Virtualization
HV installs to host OS, so resources required to run host OS, hypervisor, and guest OS's
Type 2 Virtualization
means that a Type 1 hypervisor installs directly onto the computer and manages access to the host hardware without going through a host OS.
Bare Metal
HV is itself installed on host OS
Guest OS
Ensure clients using application are always using latest most updated version
app virtualization
needs to create a sandbox that has an isolated environment to analyze viruses, worms, and Trojans.
Client-side virtualization
deploying a server role as a virtual machine. For server computers and applications, the main use of virtualization is better hardware utilization through server consolidation.
Server-side virtualization
instead enforces resource separation at the OS level. The OS defines isolated containers for each user instance to run in.
Container virtualization
Configures cloud instance to increase resources during times of high demand and decrease resources when demand drops off.
Elasticity
service experiences very little downtime. Downtime can occur as a result of scheduled maintenance and unexpected outages.
High Avail
costs involved in supplying the service to more users are linear
Scalability
per-use billing based on the type of resources such as storage, processing, bandwidth, or active users for resources consumed by the cloud
Metered Use
SDN top layer making decisions about how traffic is prioritized and secured and where it should be switched using business logic
App Layer
Interface between Control and App and Infra Layers where scripts can automate calling functions within the layers
API Layer
API Layer has two levels
Northbound and Southbound APIs
Southbound API maps Control to...
Infrastructure Layer
Northbound API maps Control to...
Application Layer
Which layer of SDN does the SDN controller operate on?
Control Layer between App and Infra Layers
SDN Control Layer has two planes
Control and Management Planes
SDN Bottom Layer containing devices (physical or virtual) handling actual traffic forwarding (switching and routing) Network appliances and NFV
Infrastructure Layer
What is the main requirement for sandboxing compute?
ISOLATE the processes to prevent virtual escape
Fiber channel net accessed only by servers for data
SAN