Upgrade to remove ads
Terms in this set (36)
Typically a data storage and processing facility run by an in-house IT department or leased offsite.
Typically an off-premise service that offers on-demand access to a shared pool of configurable computing resources. These resources can be rapidly provisioned and released with minimal management effort.
The network administrator can buy additional computing space in the Cloud without requiring the interaction with another human.
Broad network access
Access to the Cloud is available using a wide variety of client devices, such as PCs, laptops, tablets, and smartphones.
The computing capacity of the Cloud provider is shared among all its customers and can be assigned and reassigned based on customer demand.
Resource allocation to customers can quickly expand or contract with demand. To the customer, the resources and capabilities of the Cloud service provider appear to be unlimited.
Resource usage can be easily monitored, controlled, reported, and billed to provide full visibility to both the Cloud service provide and customer.
Softeare as a Service (SaaS)
The Cloud provider is responsible
for access to services , such as email, communication, and virtual desktops that are delivered over the internet.
Platform as a Service (PaaS)
The Cloud provder is responsible for access to the development tools and services used to deliver the applications.
Infrastructure as a Service (laaS)
The Cloud provider is responsible for access to the network equipment, virtualized network services, and supporting network infrastructure.
IT as a Service (ITaaS)
The Cloud provider is responsible for IT supporter for IaaS, PaaS, and SaaS service models. In the ITaaS model, an organization contracts with the Cloud provider for individual or bundled services.
Cloud-based applications and services offered in a public cloud are made available to the general population. Services may be free or are offered on a pay-per-use model, such as paying for online storage. The public cloud uses the internet to provide services.
Cloud-based applications and services offered in a private cloud are intended for a specific organization or entity, such as the government. A private cloud can be set up using the organization's private network, though this can be expensive to build and maintain.
This is made up of two or more clouds, where each part remains a distinctive object, but both are connected using a single architecture. Individuals would be able to have degrees of access to various services based on user access rights.
These are clouds built to meet the needs of a specific industry, such as healthcare or media. Commmunity clouds can be private or public.
Dynamic Host Configuration Protocol (DHCP)
This is the service used by ISPs, network administrators, and wireless routers to automatically assign IP addressing information to hosts
Domain Name Service (DNS)
This is the method computers use to translate domain names into IP addresses.
File Transfer Protocol (FTP)
This allows for data transfers between a client and a server.
File Transfer Protocol Secure (FTPS)
An FTP client can request the file transfer session be encrypted using TLS. The file server can accept or deny the request.
SSH File Transfer Protocol (SFTP)
As an extension to Secure Shell (SSH) protocol, this can be used to establish a secure file transfer session.
Secure Copy (SCP)
This uses SSH to secure file transfers.
These enables multiple computer users to access a single printer.
These have the authority to act as another computer. A popular use is to act as storage or cache for web pages that are frequently accessed by devices on the internal network.
Mail Transfer Protocol
Post Office Protocol
Internet Message Access Protocol
Universal Threat Management (UTM)
This is a generic name for an all-in-one security appliance. This include all the functionality of an IDS/IPS as well as stateful firewall services.
Displays the documentation for a specific command.
Displays the files inside a directory.
Copies files from sources to destination.
Creates a directory under the current directory.
Copies files from source to destination.
Moves files to a different directory.
Searches for specific strings of characters within a file or other commands' outputs.
Lists all the contents of a file and expects the file name as a parameter.
THIS SET IS OFTEN IN FOLDERS WITH...
IT Fundamentals - Hardware and Basics
FoCOS Credit 3
YOU MIGHT ALSO LIKE...
Cloud Essentials Certification Test
MIS Chapter 6
MIS Chapter 6
OTHER SETS BY THIS CREATOR
Visual Communications and Multimedia Design NOCTI
Photoshop Test Questions
Ports, Connectors and Adapters
Introduction to Cyber Security