Looks like no one added any tags here yet for you.
What are the four cloud service models mentioned in Chapter 1?
SaaS, PaaS, IaaS, and On-Prem.
What does Infrastructure as Code (IaC) allow users to do?
It defines servers, networks, and applications as code, allowing for modification and versioning.
What is Function as a Service (FaaS)?
A serverless architecture where applications are split into individual functions.
What is the difference between centralized and decentralized network infrastructures?
Centralized systems concentrate operations in one location, while decentralized systems distribute them across various locations.
What is the purpose of a Load Balancer?
It distributes incoming traffic evenly across multiple servers.
What is an Active Monitoring system?
A system that is connected inline and uses Intrusion Prevention Systems (IPS) for real-time monitoring.
What does the acronym SIEM stand for?
Security Information and Event Management.
What are the two types of failures in failure modes?
Fail open and fail close.
What is the role of a Proxy Server?
It sits in the middle of a conversation, making requests and validating responses to ensure they are not malicious.
What is Network Level Encryption?
Encryption methods that include IPsec tunnels and VPN connections.
What is an Air-Gapped network?
A network that is physically isolated, preventing any wireless or wired connections for data theft.
What does the Extensible Authentication Protocol (EAP) manage?
Authentication processes on networks with wireless access points like 802.1x.
What are Microservices?
An architectural style that breaks an application into a collection of small, independent services.
What are the three separate planes in Software Defined Networking (SDN)?
Data plane, control plane, and management plane.
What is the function of an Intrusion Prevention System (IPS)?
To stop malicious traffic before it enters the network.
What is meant by 'Network based firewall'?
A firewall that filters traffic based on port number or application at layer 4 of the OSI model.
What is the key benefit of using Infrastructure as Code (IaC)?
It allows for efficiency, consistency, and version control through machine-readable definitions.
What enables the Cloud Service Provider (CSP) to manage resources in Serverless computing?
The CSP dynamically manages the allocation of resources without user provision.
What is the key purpose of Industrial Control Systems (ICS) or SCADA?
To monitor, manage, and control industrial processes.
What does 'Mean Time to Repair (MTTR)' refer to?
The amount of time it takes to replace unavailable resources with available ones.
What is Containerization in computing?
The encapsulation of an application along with its dependencies in a container that can run in any environment.