0% found this document useful (0 votes)
24 views

BIT6th Sem Cloud Computing Final - EXAMINATION PAPER - 1

The document is an exam paper for a cloud computing course. It contains multiple choice questions and short/long answer questions about key cloud computing concepts like deployment models, service models, security issues and disaster recovery planning. The exam aims to test students' understanding of cloud architecture, applications and management.

Uploaded by

maharjanshijal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views

BIT6th Sem Cloud Computing Final - EXAMINATION PAPER - 1

The document is an exam paper for a cloud computing course. It contains multiple choice questions and short/long answer questions about key cloud computing concepts like deployment models, service models, security issues and disaster recovery planning. The exam aims to test students' understanding of cloud architecture, applications and management.

Uploaded by

maharjanshijal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Phoenix College Of Management

Maitidevi, kathmandu, Nepal

EXAMINATION PAPER

FACULTY: COMPUTER SCIENCE AND MULTIMEDIA


COURSE: BACHELR OF INFORMATION TECHLONOGY (HONS)
YEAR/ SEMESTER: THIRD YEAR /SEMESTER SIX
MODULE TITTLE: CLOUD COMPUTING
CODE: BIT 361
TIME ALLOWED: 3 HOURS

Section A: 30 x1=30 Marks


Multiple Choice Questions-
1. What is the metaphorical meaning of "cloud" in cloud computing?
a. A weather phenomenon
b. The internet
c. A type of server
d. A physical storage device

2. What is one of the key components of cloud computing?


a. Mainframe computing
b. Distributed computing
c. Quantum computing
d. Embedded computing

3. Which term describes the delivery of on-demand computing services over the
qinternet?
a. Mainframe computing
b. Distributed computing
c. Cloud computing
d. Parallel computing

4. Which deployment model involves a combination of private and public clouds?


a. Public cloud
b. Private cloud
c. Hybrid cloud
d. Community cloud

5. What are the key features of Platform as a Service (PaaS)?


a. Built-in security, scalability, and web services
b. Physical hardware and resources
c. Pay-per-use model
d. Virtual machines and networking infrastructure

1
Phoenix College Of Management
Maitidevi, kathmandu, Nepal

6. What is a benefit of using cloud computing models?


a. Limited scalability
b. High initial investment
c. Reduced maintenance overhead
d. Restricted accessibility

7. Which of the following is a benefit of Software as a Service (SaaS)?


a. Minimal development time
b. Built-in development environment
c. Paying for hardware and infrastructure
d. Purchasing and maintaining own software

8. What is a characteristic of Infrastructure as a Service (IaaS)?


a. Minimal development time
b. Multiple programming languages
c. Paying for virtualized resources on demand
d. Subscription-based software delivery

9. What aspect of security in cloud computing refers to preserving confidentiality,


integrity, and availability of information?
a. Data encryption
b. Identity and access management
c. Trust and privacy
d. Vulnerability management

10. What is a characteristic of Amazon EC2 service?


a. Limited scalability
b. On-premises deployment
c. Pay-per-use pricing
d. Static resource allocation

11. What is a key characteristic of Platform as a Service (PaaS)?


a. Fully integrated unified communications
b. On-demand computing resources
c. Traditional on-premises deployment
d. Pay-per-use pricing model

12. Which cloud service model provides fully integrated enterprise-class unified
communications?
a. Infrastructure as a Service (IaaS)
b. Platform as a Service (PaaS)
c. Communication as a Service (CaaS)
d. Software as a Service (SaaS)

2
Phoenix College Of Management
Maitidevi, kathmandu, Nepal

13. Which cloud service model offers protection against internal and external threats
through monitoring?
a. Infrastructure as a Service (IaaS)
b. Monitoring as a Service (MaaS)
c. Platform as a Service (PaaS)
d. Software as a Service (SaaS)

14. What is virtualization in the context of cloud computing?


a. Creating virtual reality environments
b. Simulating weather patterns
c. Abstracting physical hardware resources
d. Developing computer graphics

15. Which architectural shift characterizes the movement from single-purpose to multi-
purpose architectures in cloud networks?
a. Centralized control
b. Decentralized control
c. Monolithic design
d. Microservices architecture

16. What technology enables the virtualization of data centers in cloud computing?
a. Virtual Private Network (VPN)
b. Virtual Machine (VM)
c. Hypervisor
d. Load Balancer

17. Which software architecture facilitates the creation of flexible and scalable cloud
services?
a. Object-Oriented Programming (OOP)
b. Service-Oriented Architecture (SOA)
c. Model-View-Controller (MVC)
d. Event-Driven Architecture (EDA)

18. What is the first step in designing and implementing a cloud solution using SOA?
a. Deploy services in the cloud
b. Identify service boundaries
c. Implement service governance
d. Monitor and manage services

19. What role does open source software play in cloud data centers?
a. Increases proprietary software usage
b. Decreases flexibility and customization
c. Provides cost-effective solutions

3
Phoenix College Of Management
Maitidevi, kathmandu, Nepal

d. Limits innovation and collaboration

20. What does Disaster Recovery planning in cloud computing primarily involve?
a. Preventing all disasters from occurring
b. Identifying vulnerabilities in the system
c. Establishing protocols for restoring operations after a disaster
d. Ensuring continuous system uptime without any interruptions

21. In cloud computing, what does Host Intrusion Detection primarily aim to detect?
a. Unauthorized access to network infrastructure
b. Anomalies in network traffic patterns
c. Intrusions within the virtual machines
d. Failures in data backup mechanisms

22. What is the primary objective of implementing network detection in the cloud?
a. Ensuring physical security of data centers
b. Identifying and responding to security threats in real-time
c. Optimizing network performance
d. Reducing operational costs

23. Which cloud service model involves the delivery of software applications over the
internet?
a. Communication as a Service (CaaS)
b. Infrastructure as a Service (IaaS)
c. Platform as a Service (PaaS)
d. Software as a Service (SaaS)

24. What does the Jericho Cloud Cube Model categorize based on three dimensions?
a. Software applications
b. Deployment models
c. Data encryption methods
d. Network protocols

25. What aspect of cloud computing does security architecture design primarily focus on?
a. Data privacy and security
b. Application performance
c. Network scalability
d. Cost optimization

26. In which application domain does cloud computing offer tools like Moo, Vistaprint,
and Adobe Creative Cloud?
a. Business

4
Phoenix College Of Management
Maitidevi, kathmandu, Nepal

b. Arts
c. Education
d. Entertainment

27. What is a key aspect of security in cloud computing?


a. Data backup and recovery
b. Data ownership
c. Accessibility from anywhere
d. Multiple programming language support

28. What does trust in cloud computing involve?


a. Data confidentiality
b. Brand loyalty
c. Minimal development time
d. Simple deployment

29. Which cloud type has higher upfront and maintenance costs?
a. Public cloud
b. Private cloud
c. Both have the same costs
d. Neither has upfront costs

30. Which cloud deployment model provides a regulated environment controlled by a


single company?
a. Public Cloud
b. Private Cloud
c. Hybrid Cloud
d. Community Cloud

Section B: 6x5 = 30 Marks


Short Answer Questions (Answer Any five(5) question )
1. Explain the differences between Infrastructure as a Service (IaaS), Platform as a
Service (PaaS), and Software as a Service (SaaS). [Unit 1]
2. What are the challenges or disadvantages of cloud computing, and how can
organizations mitigate them? [Unit 1]
3. Explain the Jericho Cloud Cube Model and its significance in cloud computing
architecture. [Unit 2]
4. Outline the benefits of Communication as a Service (CaaS) and how it differs from
traditional on-premises communication solutions. [Unit 2]
5. Define the role of web presence technologies such as Apache, Jetty, and Zend
Framework in cloud computing applications. [Unit 3]

5
Phoenix College Of Management
Maitidevi, kathmandu, Nepal

6. How does data center virtualization contribute to the scalability and flexibility of
cloud computing infrastructure? Provide examples to support your explanation. [Unit
3]
7. Explain the concept of disaster recovery planning. What is vulnerability assessment in
cloud security? [Unit 4]
8. Discuss the importance of Data Privacy and Security in cloud computing and outline
strategies for ensuring robust data protection.[Unit 4]

Section C: 2x20=40 Marks


Comprehensive Answer Questions: (Answer Any Two (2) question; Case Analysis is
Compulsory )
1. Case Analysis:
a. Company XYZ is planning to migrate its legacy infrastructure to a cloud-
based environment. However, they are concerned about data security and
regulatory compliance. Propose a comprehensive strategy for Company XYZ
to ensure a smooth transition to the cloud while addressing these concerns.
2. Discuss the differences between grid computing and cloud computing, highlighting
their respective architectures, benefits, and use cases. Illustrate your answer with
examples of industries or applications where each approach is commonly used. [Unit
1]
3. Explain the concepts of trust and privacy in cloud computing, highlighting their
significance in building confidence among users and ensuring the protection of
personal and sensitive data. [Unit 4]

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy