Module 4: Overview of Virtualization

Spread the love

INTRODUCTION – Overview of Virtualization

This is how to post-doc, as some people were trained on this: life as a module foundation from training about things such as module basics on how to apply metrics in virtualization and cloud computing that concern critical niches, specifically, cloud computing governance-security measures to adopt-such as the benefits derived from it.

Learning Objectives:

  • Summarize alignment between governance, service, and organization needed to realize optimal cloud security strategy: Governance, services, and organizational structures must align for effective cloud security.
  • Identify key components of cloud security: Importance of elements defining the security of cloud environments.
  • Distinguish the three cloud service models: software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS): Differentiate the three service model components in the cloud and their application fields.
  • Summarize the core functions listed inside the cloud computing reference model: identify the core functions contained in the reference model of cloud computing.
  • Contrast the three cloud deployment models: public, private, and hybrid: Compare the characteristics, advantages, and drawbacks of the three types of cloud: public, private, and hybrid.
  • Discuss the advantages and disadvantages of cloud computing: Analyze the merits and demerits of using cloud computing in organizations.
  • Define cloud computing: Clear and concise definition of cloud computing and its relevance to business and IT infrastructures.
  • List the steps to deploying cloud services: Identify the vital steps that should be followed when deploying services to the cloud.
  • Summarize how organizations go from a virtualized to a cloud environment:

VIRTUALIZATION BASICS AND CLOUD COMPUTING

1. Where does the hypervisor sit in a virtual architecture?

  • Between the hardware and the operating system(s). (CORRECT)
  • Between the operating system and the applications.
  • Between the applications and the user.
  • Remotely to coordinate tasks between different physical computers.

Correct! It covers the hardware under the different operating systems.

2. Which are the first two steps to perform in a cloud deployment?

  • Integrate and Optimize
  • Automate and Manage
  • Consolidate and Virtualize (CORRECT)

Correct! “Manage your surroundings first.”

3. Which are the three (3) most common forms of Cloud computing?

  • Hybrid Cloud (CORRECT)
  • Private Cloud (CORRECT)
  • Universal Cloud
  • Public Cloud (CORRECT)

Partially correct. This is one of the 3.

4. Which type of cloud is the best choice for a start-up company with no existing IT infrastructure and limited funds?

  • Public Cloud (CORRECT)
  • Private Cloud
  • Hybrid Cloud
  • All of the above.

Correct! “Start up with really little upfront investments and makes it really easy to scale with growth.”

5. Which three (3) are the primary benefits of cloud computing?

  • Security
  • Efficiency (CORRECT)
  • Flexibility (CORRECT)
  • Strategic Value (CORRECT)

Partially correct! Pay only for what you use.”

Partially correct! Cloud services can expend or shut down as per the ongoing requirements.

Partially correct! “Adjusting cloud resources to new business requirements is just much more manageable than having to deal with a large sunk investment in hardware.”

6. Which is a primary security consideration in a cloud environment?

  • Disaster Recovery and Business Continuity Plan
  • Governance Plan
  • Compliance
  • All of the above. (CORRECT)

Correct! “Ill of these are pertinent to your success in the cloud.”

VIRTUALIZATION BASICS

1. Virtualization allows you to create multiple simulated environments or dedicated resources from how many physical hardware systems?

  • unlimited
  • 3
  • 1 (CORRECT)
  • 2

2. Which two steps of a cloud deployment are performed after you move your applications to the cloud?

  • Integrate and Optimize (CORRECT)
  • Consolidate and Virtualize
  • Automate and Manage

3. Which type of cloud is the best choice for a company with a robust existing IT infrastructure and very serious data privacy concerns?

  • Public Cloud
  • Private Cloud (CORRECT)
  • Hybrid Cloud
  • All of the above.

4. Which is a primary security consideration in a cloud environment?

  • Availability
  • Data Security
  • Identity and Access Management
  • All of the above. (CORRECT)

CONCLUSION – Overview of Virtualization

“In summary, this module has offered a foundational understanding of virtualization and cloud computing, covering key aspects of governance, security, and the advantages of cloud technology. With this knowledge, learners are well-prepared to navigate and make the most of virtualized and cloud-based environments.

Leave a Comment