Podcast
Questions and Answers
In the IaaS model, who maintains control over the physical hardware?
In the IaaS model, who maintains control over the physical hardware?
- The subscriber
- The cloud provider (correct)
- The operating system
- The hypervisor
What does a subscriber receive when using IaaS?
What does a subscriber receive when using IaaS?
- Admin rights over the hypervisor
- Access to virtual machines and network storage (correct)
- Physical hardware ownership
- Technical support for all software
How are usage fees calculated in IaaS?
How are usage fees calculated in IaaS?
- One-time setup fee for account creation
- Fixed monthly subscription price
- Based on user traffic to websites
- Per CPU hour and data stored per hour (correct)
Which layer is controlled by the subscriber in an IaaS environment?
Which layer is controlled by the subscriber in an IaaS environment?
What is the function of a hypervisor in an IaaS setup?
What is the function of a hypervisor in an IaaS setup?
What is the primary responsibility of the top level in the IaaS cloud architecture?
What is the primary responsibility of the top level in the IaaS cloud architecture?
Which of the following statements is true regarding the control dynamics in IaaS?
Which of the following statements is true regarding the control dynamics in IaaS?
What does the term 'virtual machine' refer to in IaaS?
What does the term 'virtual machine' refer to in IaaS?
What does the Cloud Manager primarily manage for subscribers?
What does the Cloud Manager primarily manage for subscribers?
What information is primarily stored in the Data Object Storage (DOS)?
What information is primarily stored in the Data Object Storage (DOS)?
What is the role of the Virtual Machine Monitor (VMM) in IaaS?
What is the role of the Virtual Machine Monitor (VMM) in IaaS?
What type of networks do computers within a Cluster Manager generally use?
What type of networks do computers within a Cluster Manager generally use?
Which level of the IaaS cloud architecture is responsible for calculating resource availability based on commands from the Cloud Manager?
Which level of the IaaS cloud architecture is responsible for calculating resource availability based on commands from the Cloud Manager?
What mechanism does the Cloud Manager have for servicing subscriber requests?
What mechanism does the Cloud Manager have for servicing subscriber requests?
How does the management of geographically distant computer clusters occur?
How does the management of geographically distant computer clusters occur?
What is a key function of the middle level in IaaS cloud systems?
What is a key function of the middle level in IaaS cloud systems?
What primarily affects the security of data and processing in an outsourced private cloud?
What primarily affects the security of data and processing in an outsourced private cloud?
What is a common consideration for subscribers in choosing an outsourced private cloud?
What is a common consideration for subscribers in choosing an outsourced private cloud?
What could impact the on-demand bulk data import/export in an outsourced private cloud?
What could impact the on-demand bulk data import/export in an outsourced private cloud?
What is a potential up-front cost for a subscriber migrating to an outsourced private cloud?
What is a potential up-front cost for a subscriber migrating to an outsourced private cloud?
Which of the following is a risk associated with multi-tenancy in an outsourced private cloud?
Which of the following is a risk associated with multi-tenancy in an outsourced private cloud?
What does the concept of heterogeneity in networking technologies refer to?
What does the concept of heterogeneity in networking technologies refer to?
Which of the following best describes the resources in an outsourced private cloud?
Which of the following best describes the resources in an outsourced private cloud?
What is a significant difference between on-site and outsourced private cloud security measures?
What is a significant difference between on-site and outsourced private cloud security measures?
What may need to be adjusted when using an outsourced private cloud to improve network performance?
What may need to be adjusted when using an outsourced private cloud to improve network performance?
Which of the following is a reason for the importance of experimental and deployment facilities in networking?
Which of the following is a reason for the importance of experimental and deployment facilities in networking?
What is a key goal of considering legacy support in modern networking designs?
What is a key goal of considering legacy support in modern networking designs?
Which of the following describes XML best?
Which of the following describes XML best?
In the context of XML, what is the purpose of defining language dialects?
In the context of XML, what is the purpose of defining language dialects?
What is the fundamental requirement for well-formed XML?
What is the fundamental requirement for well-formed XML?
Which statement best describes the role of parsers in XML processing?
Which statement best describes the role of parsers in XML processing?
Which of the following is NOT an example of a networking technology?
Which of the following is NOT an example of a networking technology?
Which feature allows a VM running on one brand of server to be relocated to another brand without issues?
Which feature allows a VM running on one brand of server to be relocated to another brand without issues?
Which characteristic is true for a conventional third generation computer in virtualization?
Which characteristic is true for a conventional third generation computer in virtualization?
What is a primary drawback of full virtualization?
What is a primary drawback of full virtualization?
What type of sensitive instructions require control of the guest OS to prevent exposure?
What type of sensitive instructions require control of the guest OS to prevent exposure?
Which is an advantage of para-virtualization over full virtualization?
Which is an advantage of para-virtualization over full virtualization?
What role does the VMM play in para-virtualization?
What role does the VMM play in para-virtualization?
How does full virtualization provide an emulated environment to the guest OS?
How does full virtualization provide an emulated environment to the guest OS?
What is a significant disadvantage of running an unmodified OS in a virtualized environment?
What is a significant disadvantage of running an unmodified OS in a virtualized environment?
What does hardware-assisted virtualization allow a guest OS to do?
What does hardware-assisted virtualization allow a guest OS to do?
Which of the following is a requirement for using para-virtualization?
Which of the following is a requirement for using para-virtualization?
What is a limitation of using para-virtualization in certain operating systems?
What is a limitation of using para-virtualization in certain operating systems?
Which virtualization approach is characterized by modifying the guest OS to improve performance?
Which virtualization approach is characterized by modifying the guest OS to improve performance?
What does the term 'Ring 0' refer to in virtualization contexts?
What does the term 'Ring 0' refer to in virtualization contexts?
Which of the following best defines hardware-assisted virtualization?
Which of the following best defines hardware-assisted virtualization?
Why is it significant that a VMM runs in a more privileged ring than the guest OS?
Why is it significant that a VMM runs in a more privileged ring than the guest OS?
Study Notes
Outsourced Private Cloud
- The security of data and processing in an outsourced private cloud depends on the strength and availability of both security perimeters and the protected communication link.
- Organizations considering the use of an outsourced private cloud should leverage high-performance and/or high-reliability networking between the provider and subscriber.
- In the outsourced private cloud scenario, a subscriber can rent resources in any quantity offered by the provider.
- Subscribers should negotiate service level agreements (SLAs) and potentially upgrade their network to connect to the outsourced private cloud.
IaaS (Infrastructure as a Service)
- IaaS provides subscribers with access to virtual computers, network-accessible storage, network infrastructure components such as firewalls, and configuration services.
- Usage fees are typically calculated based on CPU hours, data GB stored per hour, network bandwidth consumed, network infrastructure used (e.g., IP addresses) per hour, and value-added services used (e.g., monitoring, automatic scaling).
- IaaS component stack comprises hardware, operating system, middleware, and applications.
- The provider maintains total control over the physical hardware and administrative control over the hypervisor layer.
- The subscriber controls the Guest OS, Middleware, and Applications layers.
IaaS Cloud Architecture
- IaaS cloud systems have a three-level hierarchy of components:
- Top Level: Central control
- Middle Level: Management of potentially large computer clusters
- Bottom Level: Running host computer systems on which virtual machines are created.
- The Cloud Manager is the public access point to the cloud where subscribers sign up for accounts, manage rented resources, and access data stored in the cloud.
Data Object Storage (DOS)
- DOS typically stores the subscriber's metadata like user credentials and operating system images.
Server Virtualization
- Virtualization techniques include full virtualization, para-virtualization, and hardware-assisted virtualization.
- Full virtualization emulates hardware, enabling VM portability.
- Para-virtualization modifies the guest OS to communicate with the VMM, improving performance.
- Hardware-assisted virtualization leverages processor extensions to optimize privileged operations.
Network Virtualization
- Network virtualization enables flexible, efficient, and secure network configuration and management.
- It allows for diverse networking technologies, such as optical, sensor, and wireless.
Virtual Internet
- Virtual Internet aims to create a collection of multiple virtual Internets with legacy support.
- It leverages networking technology and architectural domains for resource management and network spawning.
XML
- XML provides a syntax for encoding text-based data and defining custom elements.
- XML has evolved to include a growing family of application frameworks and dialects.
- Key features of XML include extensibility, universal format, and structural integrity.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz explores the concepts of outsourced private cloud services and Infrastructure as a Service (IaaS). It covers essential aspects including data security, networking requirements, and service level agreements. Test your understanding of how organizations can benefit from these technologies.