Acs104 Cc Qb
Acs104 Cc Qb
QUESTION BANK
SUBJECT CODE: ACS104 YEAR / SEM: I/II
SUBJECT NAME: Fundamentals Of Cloud Computing ACADEMIC YEAR: 2024-2025
NAME OF THE FACULTY: Mr. S.PARTHASARATHI
Course Outcomes
After successful Completion of the Course, the Students should be able to
Course
Course Outcomes
Outcome No
CO4 Develop and deploy services on the cloud and set up a cloud environment
CO5 Explain security challenges in the cloud environment
Network-Based Systems- Concepts of Distributed Systems. Definition of Cloud, Concepts of Cloud Computing.
Cloud Service Providers, NIST Cloud Computing, Cloud Characteristics
PART – A
BT
Q.No Questions Topic Mark
Level
Network- 2M
1. What are the key components of a network-based system? Based K1
Systems
Network- 2M
What are the differences between a client-server and peer-to-peer
2. Based K1
network?
Systems
Network- 2M
3. What is the difference between wired and wireless networks? Based K1
Systems
Network- K1 2M
4. What is the OSI model, and what are its seven layers? Based
Systems
Network- K1 2M
5. What is the role of a router in a network? Based
Systems
Concepts of K1 2M
What is a distributed system? How does it differ from a centralized
6. Distributed
system?
Systems
Concepts of K2 2M
Mention the difference between synchronous and asynchronous
7. Distributed
communication in distributed systems?
Systems
Concepts of K2 2M
8. What is data consistency in distributed systems? Distributed
Systems
Concepts of K2 2M
9. How is synchronization achieved in distributed systems? Distributed
Systems
Concepts of K2 2M
10. What are the primary security concerns in distributed systems? Distributed
Systems
Definition of K2 2M
11. What is Cloud Computing?
Cloud
Definition of K2 2M
12. What are the key characteristics of Cloud Computing?
Cloud
Definition of K2 2M
13. What are the deployment models of Cloud Computing? Cloud
What is the difference between edge computing and cloud Definition of K2 2M
14. Cloud
computing?
Definition of K2 2M
15. How is data stored and managed in the cloud? Cloud
Concepts of K2 2M
16. What is scalability in the context of Cloud Computing? Cloud
Computing
Concepts of K2 2M
17. What is elasticity, and how does it benefit cloud users? Cloud
Computing
Concepts of K2 2M
18. What are the common security challenges in Cloud Computing? Cloud
Computing
What is virtualization, and why is it essential for Cloud Concepts of K2 2M
19. Cloud
Computing? Computing
Concepts of K2 2M
20. How does hypervisor technology enable virtualization? Cloud
Computing
Lists the actors defined in the NIST cloud computing reference NIST Cloud K2 2M
21.
architecture? Computing
NIST Cloud K2 2M
22. Discuss general activity of actors in NIST architecture?
Computing
Cloud K2 2M
23. What is a Cloud Deployment Model? deployment
models
Cloud K2 2M
24. What is the Right Choice for Cloud Deployment Model? deployment
models
Cloud K2 2M
25. What are different Models of Cloud Computing? service
models
PART – B
Cloud
1. Explain in details about architecture of cloud computing? K2 13M
Architecture
Cloud 13M
2. Discuss about system models for distributed and cloud computing? service K2
models
13M
Cloud
3. Explain in detail about Layered Cloud Architecture Design? K2
Architecture
Explain in detail about architectural design challenges of 13M
Design
4. i. Service availability and data locking problem K3
Challenges
ii. Data Privacy and Security Concerns?
Explain in detail about architectural design challenges of 13M
Design
5. (i) Unpredictable Performance and Bottlenecks K2
Challenges
(ii) Distributed Storage and Wide spread Software Bugs?
Cloud 13M
6. Explain in details about Models of Cloud Computing? K2
service
Discuss about the common security challenges in Cloud Concepts of 13M
7. Cloud K2
Computing? Computing
Cloud 13M
8. Design the architecture of Cloud Deployment Model? deployment K3
models
Concepts of 13M
9. How does hypervisor technology enable virtualization? Cloud K2
Computing
Concepts of 13M
10. Explain in details about data stored and managed in the cloud? Cloud K2
Computing
Cloud Pros and Cons. Layered Architectural Design, Cloud Delivery Models. Cloud Deployment Models,
Architectural Design Challenges, Cloud Storage - Storage-as-a-Service – Advantages of Cloud Storage - Cloud
Storage Providers - S3.
PART – A
BT
Q.No Questions Topic Mark
Level
Cloud Storage 2M
19. List the disadvantages of the public cloud model? K2
Cloud Storage 2M
20. Define Infrastructure as a service (IaaS)? K1
Storage-as-a- 2M
21. What is data Security? Service K2
Storage-as-a- K1 2M
22. Define the term Data residency. Service
Cloud Storage K1 2M
23. Mention the providers of STaas. Providers
Cloud Storage 2M
24. What are the restrictions of Cloud Storage providers? Providers K1
Cloud Storage 2M
25. Mention the benefits of Cloud Providers. Providers K1
PART – B
Discuss about the Community Cloud differ from both Public and 13M
9. Cloud Storage K2
Private Clouds?
13M
10. Explain the typical layers in a cloud-based architectural design? Cloud Storage K2
Virtual Machine and its architecture–VM primitive operations- Virtual Infrastructures- Data Center Virtualization
for Cloud Computing–Levels of Virtualization Implementation – VMM Design Requirements, Virtualization
Support at the OS Level, Physical versus Virtual Clusters. Live VM Migration Steps
PART – A
BT
Q.No Questions Topic Mark
Level
Designing and Implementing a Data Center-Based Cloud Installing Open Source Cloud service. Virtual Box –
Eucalyptus Public Cloud Platforms: Google App Engine, Amazon Web Services (AWS). Google Cloud Platform.
Emerging Cloud Software Environments.
PART – A
BT
Q.No Questions Topic Mark
Level
Google App
1. What is Google App Engine? Engine K1 2M
Google App 2M
5. What are some common use cases for Google App Engine? Engine K2
Amazon AWS 2M
6. What is AWS? K1
Amazon AWS 2M
7. What is Amazon EC2? K1
Amazon AWS 2M
8. What is S3 in AWS? K1
Amazon AWS 2M
9. What is AWS Lambda? K2
Amazon AWS 2M
10. Give the structure of the AWS Free Tier? K2
Amazon AWS 2M
11. Define Amazon DynamoDB? K2
Microsoft Azure 2M
12. What is Microsoft Azure? K2
How does Azure Virtual Machines differ from Azure App Microsoft Azure 2M
13. K2
Services?
Microsoft Azure 2M
14. How would you deploy a scalable web application on Azure? K1
What are the differences between Azure Blob Storage and Microsoft Azure 2M
15. K1
Azure File Storage?
What factors would you consider when choosing between Microsoft Azure 2M
16. K2
Azure SQL Database and Azure Cosmos DB?
Cloud Software 2M
17. What are cloud software environments? Environments K1
Cloud Software 2M
18. What are the three main types of cloud environments? Environments K2
Cloud Software 2M
19. What is SaaS in cloud computing? Environments K2
Cloud Software 2M
20. How does a PaaS environment differ from IaaS? Environments K2
Cloud Software 2M
21. What is a multi-cloud environment? Environments K2
Cloud Software 2M
22. What are the benefits of using a cloud environment? Environments K2
Cloud Software 2M
23. What role does virtualization play in cloud environments? Environments K1
Eucalyptus 2M
24. What is Eucalyptus in cloud computing? K2
Eucalyptus 2M
25. Who developed Eucalyptus? K2
Eucalyptus K1 2M
26. Mention the main purpose of Eucalyptus?
Eucalyptus K1 2M
27. Give the key components of Eucalyptus?
Eucalyptus K1 2M
28. How does Eucalyptus support hybrid cloud computing?
OpenStack 2M
29. What is OpenStack? K2
OpenStack K1 2M
30. Who are the main contributors to OpenStack?
OpenStack K1 2M
31. What are the core components of OpenStack?
OpenStack K1 2M
32. What is the role of the Nova component in OpenStack?
OpenStack K2 2M
33. How does OpenStack handle networking?
PART – B
What are the key considerations for migrating an on-premises Google App K2
1. application to Google App Engine, and how can organizations Engine 13M
ensure a smooth transition?
In what scenarios would you choose Google App Engine's Google App K3 13M
2. Standard environment over the Flexible environment, and vice Engine
versa?
How does AWS support hybrid cloud architectures, and what Amazon AWS K3 13M
3. are the best practices for integrating on-premises infrastructure
with AWS services?
Impact the design and deployment of highly available and Amazon AWS K2 13M
4.
fault-tolerant applications?
What are the best practices for securing an Azure environment, K2 13M
5. including identity management, network security, and Microsoft Azure
compliance with industry standards?
What are the architectural differences between Infrastructure K1 13M
Cloud Software
6. as a Service (IaaS), Platform as a Service (PaaS), and Software
Environments
as a Service (SaaS).
What are the advantages and limitations of using serverless Cloud Software K1 13M
7.
platforms for various types of workloads? Environments
What are the main architectural components of Eucalyptus, Eucalyptus K1 13M
8.
and how do they interact to provide cloud services?
Explain the advantages and limitations of using Eucalyptus for Eucalyptus K1 13M
9.
storage-intensive applications?
Enumerate the core components of OpenStack, and how do Open Stack K2 13M
10.
they interact to provide a complete cloud computing platform?
Cloud Security Infrastructure Security Network level security- Host level security, Application level security- Data
privacy and security Issues. Access Control and Authentication in cloud computing, IAM Security Standards
PART – A
BT
Q.No Questions Topic Mark
Level
Cloud
1. Define guest hopping in virtualization? Security K1 2M
Infrastructure 2M
6. Define VM migration attack? Security K1
IAM Security K1 2M
21. What is data masking and how is it used in data security? Standards
IAM Security K1 2M
22. Mention the key principles of data access control? Standards
IAM Security K1 2M
23. Define Data Loss Prevention (DLP) strategy? Standards
IAM Security K1 2M
24. How does a RAID configuration enhance data storage reliability? Standards
What is the purpose of an access control list (ACL) in data IAM Security K1 2M
25. Standards
storage?
PART – B
Virtualization K2
1. How does virtualization impact system performance? System 13M
Virtualization K2 13M
2. Enumerate the licensing and cost implications of virtualization? System
Guest K2 13M
3. Explain the functions of guest hopping. hopping
How does network segmentation and isolation help in preventing Guest K2 13M
4. hopping
guest hopping?
What role do hypervisors and virtualization management tools VM migration K3 13M
5. attack
play in preventing VM migration attacks?
Explain the implications of VM migration attacks for compliance VM migration K2 13M
6. attack
and regulatory requirements?
How can data redundancy and replication be used to enhance Data Security K2 13M
7. and Storage
storage reliability?
How can data be protected from unauthorized access? Explain Data Security K2 13M
8. and Storage
with respect to access controls.
How can you implement single sign-on (SSO) and federated IAM K2 13M
9.
identity management?