Chapter 2 fundamental cloud computing

答案是我自己做的,有出错的地方欢迎指正

选择题

1.Established and deployed by ISPs, the Internet’s largest backbone(脊梁) networks are strategically(战略性的)interconnected(连接的) by core__ that connect the world’s multinational networks.
A
routers

B
switches

C
modems

D
firewalls
答案:A ISP(网络服务提供商)通过核心路由器来链接世界上不同国家之间的网络

2.Virtualization technology enables different virtual servers to share one physical server. This process is called
A
Hardware Independence

B
Server Consolidation

C
Resource Replication

D
Virtualization management
答案:B 虚拟化技术可以让多台虚拟服务器在一台物理上的服务器运行,这个过程称为Server Consolidation(服务器整合)

3.Virtualization is the process of converting a __IT resource into a virtual IT resource.
A
software

B
logical

C
physical

D
All
答案:同上题 虚拟化是将物理服务器转换为虚拟的IT资源

4.Virtualization software runs on a physical server called a ___ , whose underlying(潜在的) hardware is made accessible by the virtualization software.

A
host

B
client

C
browser

D
none
答案:B在虚拟服务器上运行的软件应称为客户
5.___exists as an authorized cloud service consumer with legitimate(合法的) credentials(证书) that it uses to exploit(渗透)access to cloud-based IT resources.

A
A malicious insider

B
A trusted attacker

C
A malicious service agent

D
An anonymous attacker
答案:B 受信任的攻击者指的是拥有合法的证书却使用合法的授权去渗透IT资源

6.Cloud Deployment Models include __
A
Infrastructure-as-a-Service, Platform-as-a-Service, Software-as-a-Service
B
Public cloud, Community cloud, Private cloud, Hybrid cloud
C
cloud providers
D
administrator
答案:B
四种云开发模型
public cloud
this type of cloud deployment model supports all users who want to make use of a computing resource, such as hardware (OS, CPU, memory, storage) or software (application server, database) on a subscription basis(订阅).
大概说的是这种模型允许所有订阅的用户使用想使用计算资源如操作系统 CPU 内存或是软件资源。
private cloud
True to its name, a private cloud is typically infrastructure used by a single organization. Such infrastructure may be managed by the organization itself to support various user groups, or it could be managed by a service provider that takes care of it either on-site or off-site.
正如其名,私人服务云就是被组织或是私人所拥有的服务器,只被拥有者自己管理。
hybrid cloud(混合云)
In a hybrid cloud, an organization makes use of interconnected private and public cloud infrastructure. Many organizations make use of this model when they need to scale up their IT infrastructure rapidly, such as when leveraging public clouds to supplement the capacity available within a private cloud.
组织可以连接私人或是公共的云设施,许多组织都使用这种模型当他们需要快速的拓展他们的IT资源时(类似于分布式?)
community cloud
Community cloud This deployment model supports multiple organizations sharing computing resources that are part of a community; examples include universities cooperating in certain areas of research, or police departments within a county or state sharing computing resources.
社区云(生态云)允许不同的开发者共享资源,类似于大学的服务器,或是警察们使用的国家级的服务器。*
6.Cloud Delivery Models includes

A
Infrastructure-as-a-Service, Platform-as-a-Service, Software-as-a-Service
B
Public cloud, Community cloud, Private cloud, Hybrid cloud
C
cloud providers
D
administrator
答案:A
三种云交付模型
Software as a Service (SaaS)
SaaS clients use applications supplied by the service provider. SaaS does not allow any control of the cloud platform or the infrastructure.
给用户直接提供应用,不允许用户对云平台有任何的操作。
Platform as a Service (PaaS)
PaaS users can deploy consumer-created or acquired applications using programming languages and tools supported by the CSP.
PaaS的用户可以使用云服务提供者提供的编程语言和工具开发客制化的或是后天的(?)的应用程序。
Infrastructure as a Service (IaaS)
IaaS allows a more sophisticated(经验丰富的) user to deploy and run arbitrary(任意的) software, including operating systems and applications.
想干啥都行,相当于直接把硬件扔给你。

判断题

1
Integrity(正直) is the characteristic of not having been altered by an unauthorized party.
错误
不要说没被授权的组织,什么玩意的特性也不是正直。

2
Traffic eavesdropping is to compromise the confidentiality and integrity.
正确
交通窃听是对机密和正直的一大威胁

3
Overlapping trust boundaries represent a threat whereby attackers can exploit cloud-based IT resources shared by multiple cloud consumers.

正确
Overlapping Trust Boundaries. Since cloud
services often share resources among many different customers great care must be taken in establishing boundaries between them. Attackers can target shared resources with the intention of compromising other customers, or the underlying infrastructure as a way to get access to other customers resources.

重合的信任边界,当云服务器需要经常在不同的用户间分享资源时,必须极为小心,攻击者可能会以攻击其他用户的意图来分享资源。

4
Availability is the characteristic of being accessible and usable during all time period.
正确
可用性是指在任何时间都可以访问和使用的特性

5
Confidentiality is the characteristic of something having been provided by an authorized source.
错误
Confidentiality is the characteristic of something being made accessible only to authorized
机密性是指只有授权方才能访问资源

6
A virtualization attack exploits vulnerabilities(缺陷) within physical environments to gain unauthorized access to underlying physical hardware.
正确
虚拟化攻击使用硬件环境的一些漏洞来获得未经许可的对底层硬件设备的访问权限。

7
Authenticity is the characteristic of something being made accessible only to authorized parties.
正确
真实性是指被分享的资源只来自于被授权的来源

简答题

1.How many types of scaling? What are they?
There are two types of scaling .

Vertiacal Scale

It is the ability to increase the capacity of existing hardware or software by adding resources.

Horizon Scale

It is the ability to connect multiple hardware or software entities, such as servers.

垂直和水平拓展 一个是升级你的硬件,一个是再买更多你的硬件

2.Chapter 2 fundamental cloud computing_第1张图片
How many cloud security threats? which is cloud security threat in the figure?

1 Traffic Evaesdropping 交通窃听
当消息传输时可能被人拷贝一份
2 Malicious Intermediary 恶意中介
消息被恶意的中介拦截,并被修改
3 Denial of Servic 拒绝服务
通过大量的攻击让目标IT资源超载,无法提供正常服务
4 Insufficient Authorization /Week Authentication
充足的授权/弱认证
授权给的太广泛导致攻击者可以接触到正常来说是被保护的IT资源
5 Virtualization Attack 虚拟化攻击
虚拟机的使用者滥用了权限,去攻击底层的物理硬件设施

图片里的是Malicious Intermediary 恶意中介

你可能感兴趣的:(软件体系结构(云计算),云服务)