0% found this document useful (0 votes)
25 views

Acs104 Cc Qb

The document is a question bank for the course 'Fundamentals of Cloud Computing' for the academic year 2024-2025, detailing course outcomes and knowledge levels based on Bloom's taxonomy. It includes questions categorized into different units covering cloud architecture, virtualization basics, and virtualization infrastructure, along with their respective marks and difficulty levels. The document aims to assess students' understanding of key concepts and challenges in cloud computing and virtualization.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views

Acs104 Cc Qb

The document is a question bank for the course 'Fundamentals of Cloud Computing' for the academic year 2024-2025, detailing course outcomes and knowledge levels based on Bloom's taxonomy. It includes questions categorized into different units covering cloud architecture, virtualization basics, and virtualization infrastructure, along with their respective marks and difficulty levels. The document aims to assess students' understanding of key concepts and challenges in cloud computing and virtualization.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 15

DEPARTMENT OF COMPUTER SCIENCE ENGINEERING

QUESTION BANK
SUBJECT CODE: ACS104 YEAR / SEM: I/II
SUBJECT NAME: Fundamentals Of Cloud Computing ACADEMIC YEAR: 2024-2025
NAME OF THE FACULTY: Mr. S.PARTHASARATHI

Course Outcomes
After successful Completion of the Course, the Students should be able to
Course
Course Outcomes
Outcome No

CO1 Understand the design challenges in the cloud.

CO2 Apply the concept of virtualization and its types


CO3 Experiment with virtualization of hardware resources and Docker

CO4 Develop and deploy services on the cloud and set up a cloud environment
CO5 Explain security challenges in the cloud environment

Knowledge Level (Blooms Taxonomy)


K Applying
K Remembering K Understanding
(Application of
1 (Knowledge) 2 (Comprehension) 3
Knowledge)
Analyzing Evaluating K Creating
K K
4 (Analysis) 5 (Evaluation) 6 (Synthesis)
UNIT I CLOUD ARCHITECTURE MODELS AND INFRASTRUCTURE

Network-Based Systems- Concepts of Distributed Systems. Definition of Cloud, Concepts of Cloud Computing.
Cloud Service Providers, NIST Cloud Computing, Cloud Characteristics
PART – A

BT
Q.No Questions Topic Mark
Level

Network- 2M
1. What are the key components of a network-based system? Based K1
Systems
Network- 2M
What are the differences between a client-server and peer-to-peer
2. Based K1
network?
Systems
Network- 2M
3. What is the difference between wired and wireless networks? Based K1
Systems
Network- K1 2M
4. What is the OSI model, and what are its seven layers? Based
Systems
Network- K1 2M
5. What is the role of a router in a network? Based
Systems
Concepts of K1 2M
What is a distributed system? How does it differ from a centralized
6. Distributed
system?
Systems
Concepts of K2 2M
Mention the difference between synchronous and asynchronous
7. Distributed
communication in distributed systems?
Systems
Concepts of K2 2M
8. What is data consistency in distributed systems? Distributed
Systems
Concepts of K2 2M
9. How is synchronization achieved in distributed systems? Distributed
Systems
Concepts of K2 2M
10. What are the primary security concerns in distributed systems? Distributed
Systems
Definition of K2 2M
11. What is Cloud Computing?
Cloud
Definition of K2 2M
12. What are the key characteristics of Cloud Computing?
Cloud
Definition of K2 2M
13. What are the deployment models of Cloud Computing? Cloud
What is the difference between edge computing and cloud Definition of K2 2M
14. Cloud
computing?
Definition of K2 2M
15. How is data stored and managed in the cloud? Cloud
Concepts of K2 2M
16. What is scalability in the context of Cloud Computing? Cloud
Computing
Concepts of K2 2M
17. What is elasticity, and how does it benefit cloud users? Cloud
Computing
Concepts of K2 2M
18. What are the common security challenges in Cloud Computing? Cloud
Computing
What is virtualization, and why is it essential for Cloud Concepts of K2 2M
19. Cloud
Computing? Computing
Concepts of K2 2M
20. How does hypervisor technology enable virtualization? Cloud
Computing
Lists the actors defined in the NIST cloud computing reference NIST Cloud K2 2M
21.
architecture? Computing
NIST Cloud K2 2M
22. Discuss general activity of actors in NIST architecture?
Computing
Cloud K2 2M
23. What is a Cloud Deployment Model? deployment
models
Cloud K2 2M
24. What is the Right Choice for Cloud Deployment Model? deployment
models
Cloud K2 2M
25. What are different Models of Cloud Computing? service
models
PART – B
Cloud
1. Explain in details about architecture of cloud computing? K2 13M
Architecture
Cloud 13M
2. Discuss about system models for distributed and cloud computing? service K2
models
13M
Cloud
3. Explain in detail about Layered Cloud Architecture Design? K2
Architecture
Explain in detail about architectural design challenges of 13M
Design
4. i. Service availability and data locking problem K3
Challenges
ii. Data Privacy and Security Concerns?
Explain in detail about architectural design challenges of 13M
Design
5. (i) Unpredictable Performance and Bottlenecks K2
Challenges
(ii) Distributed Storage and Wide spread Software Bugs?
Cloud 13M
6. Explain in details about Models of Cloud Computing? K2
service
Discuss about the common security challenges in Cloud Concepts of 13M
7. Cloud K2
Computing? Computing
Cloud 13M
8. Design the architecture of Cloud Deployment Model? deployment K3
models
Concepts of 13M
9. How does hypervisor technology enable virtualization? Cloud K2
Computing
Concepts of 13M
10. Explain in details about data stored and managed in the cloud? Cloud K2
Computing

UNIT II VIRTUALIZATION BASICS

Cloud Pros and Cons. Layered Architectural Design, Cloud Delivery Models. Cloud Deployment Models,
Architectural Design Challenges, Cloud Storage - Storage-as-a-Service – Advantages of Cloud Storage - Cloud
Storage Providers - S3.
PART – A
BT
Q.No Questions Topic Mark
Level

Cloud Pros and 2M


1. What are the primary benefits of Cloud Computing? K1
Cons
What are the benefits of global accessibility in Cloud Cloud Pros and 2M
2. K1
Computing? Cons
2M
Cloud Pros and
3. How can data breaches be a disadvantage of using the cloud? K1
Cons
Layered 2M
How does the layered architecture support scalability and
4. Architectural K1
flexibility in cloud environments?
Design
Layered 2M
5. What are the typical layers in a cloud-based architectural design? Architectural K2
Design
Layered 2M
6. What is the role of the network layer in cloud architecture? Architectural K1
Design
Cloud Delivery 2M
7. What are the three primary cloud delivery models? K1
Models
How do the cloud delivery models (IaaS, PaaS, SaaS) differ from Cloud Delivery 2M
8. K1
one another? Models
Cloud Delivery K2 2M
9. What are the key features of IaaS?
Models
Cloud K2 2M
What factors influence the choice of a cloud deployment model
10. Deployment
for a business?
Models
Cloud 2M
11. What is a Public Cloud, and how does it operate? Deployment K1
Models
Cloud 2M
12. What are the limitations or drawbacks of using a Public Cloud? Deployment K1
Models
Cloud K1 2M
What challenges might organizations face when managing a
13. Deployment
Hybrid Cloud setup?
Models
Architectural K1 2M
How does a Community Cloud differ from both Public and
14. Design
Private Clouds?
Challenges
Architectural K1 2M
What are the future trends in multi-cloud and inter-cloud
15. Design
solutions, and how do they relate to existing deployment models?
Challenges
Architectural 2M
16. Define Infrastructure as a service (IaaS)? Design K1
Challenges
Architectural 2M
17. Define Platform as a service (PaaS)? Design K1
Challenges
Cloud Storage 2M
18. Define Software as a service(SaaS)? K1

Cloud Storage 2M
19. List the disadvantages of the public cloud model? K2

Cloud Storage 2M
20. Define Infrastructure as a service (IaaS)? K1

Storage-as-a- 2M
21. What is data Security? Service K2

Storage-as-a- K1 2M
22. Define the term Data residency. Service
Cloud Storage K1 2M
23. Mention the providers of STaas. Providers
Cloud Storage 2M
24. What are the restrictions of Cloud Storage providers? Providers K1

Cloud Storage 2M
25. Mention the benefits of Cloud Providers. Providers K1

PART – B

Explain in details about Virtualization in Cloud Computing and Layered


1. Architectural K2 13M
Types?
Design
What are the difference between Cloud computing and Layered 13M
2. Architectural K2
Virtualization
Design
Layered 13M
3. Explain in details about hypervisor and its types? Architectural K2
Design
4. Discuss about the Taxonomy of virtual machines? Layered K2 13M
Architectural
Design
Architectural 13M
5. Explain the Key Concepts of virtualization? Design K2
Challenges
Architectural 13M
6. Explain in detail about virtualization structures? Design K2
Challenges
Architectural 13M
7. Discuss about the Types of Virtualization? Briefly explain each. Design K2
Challenges
13M
8. Explain the architecture of Infrastructure as a service Cloud Storage K2

Discuss about the Community Cloud differ from both Public and 13M
9. Cloud Storage K2
Private Clouds?
13M
10. Explain the typical layers in a cloud-based architectural design? Cloud Storage K2

UNIT III VIRTUALIZATION INFRASTRUCTURE AND DOCKER

Virtual Machine and its architecture–VM primitive operations- Virtual Infrastructures- Data Center Virtualization
for Cloud Computing–Levels of Virtualization Implementation – VMM Design Requirements, Virtualization
Support at the OS Level, Physical versus Virtual Clusters. Live VM Migration Steps

PART – A

BT
Q.No Questions Topic Mark
Level

What are the key benefits of implementing desktop Virtual Machine


1. and its K1 2M
virtualization in an organization?
architecture
2. Virtual Machine K1 2M
How does desktop virtualization impact end-user experience
and performance? and its
architecture
Virtual Machine 2M
What are the main types of desktop virtualization technologies
3. and its K2
available, and how do they differ? architecture
What are the common challenges or limitations faced when Virtual Machine 2M
4. and its K1
deploying desktop virtualization solutions?
architecture
How do security considerations play a role in desktop Virtual Machine 2M
5. and its K1
virtualization, and what best practices should be followed?
architecture
What are the primary benefits of network virtualization for VM primitive 2M
6. operations K1
managing and scaling network infrastructure?
How does network virtualization differ from traditional VM primitive 2M
7. operations K2
network architecture in terms of design and operation?
What are the common types of network virtualization VM primitive 2M
8. technologies, and how do they address different network operations K1
requirements?
What are the potential challenges or drawbacks associated with Data Center K1 2M
9. implementing network virtualization in an enterprise Virtualization for
environment? Cloud Computing

What strategies can be employed to ensure a secure virtualized Data Center K1 2M


10. Virtualization for
network environment?
Cloud Computing
How does storage virtualization impact the performance and Data Center K1 2M
11. Virtualization for
reliability of storage systems?
Cloud Computing
What are the different types of storage virtualization Data Center K1 2M
12. Virtualization for
technologies, and how do they differ in their implementation?
Cloud Computing
What are the key advantages of storage virtualization for Data Center K1 2M
13. Virtualization for
managing data storage systems?
Cloud Computing
How does system-level virtualization differ from application- VMM Design 2M
14. Requirements K2
level virtualization in terms of architecture and use cases?
What are the main advantages of system-level virtualization VMM Design K1 2M
15. for operating systems, and how does it benefit IT Requirements
infrastructure?
What are the key types of hypervisors used in system-level VMM Design K1 2M
16. virtualization, and how do they differ in their approach to Requirements
virtualization?
17. VMM Design K1 2M
What are the primary advantages of using application
virtualization over traditional application deployment Requirements
methods?
Physical versus K1 2M
18. How can application virtualization impact security? Virtual Clusters
What are the main technologies used for application Physical versus K1 2M
19. Virtual Clusters
virtualization?
Physical versus K1 2M
20. What is application virtualization? Virtual Clusters
Physical versus K1 2M
21. What is a virtual cluster? Virtual Clusters
Virtual clusters K1 2M
22. How do virtual clusters improve resource utilization? and Resource
Management
What are the main tools or technologies used for managing Virtual clusters K1 2M
23. and Resource
virtual clusters?
Management
Virtual clusters K1 2M
24. How does resource allocation work in a virtual cluster? and Resource
Management
Virtual clusters K1 2M
25. What are common challenges in managing virtual clusters? and Resource
Management
PART – B
What are the key benefits of implementing desktop Data Center K3
1. virtualization in an enterprise environment, and how do these Virtualization for 13M
benefits impact overall IT operations and user experience? Cloud Computing
What are the specific security challenges associated with Data Center K2 13M
2. network virtualization, including potential vulnerabilities and Virtualization for
attack vectors Cloud Computing
How does network virtualization impact network security, and Data Center K2 13M
3. what best practices should be followed to ensure a secure Virtualization for
virtualized network environment? Cloud Computing
What are the various types of storage virtualization VMM Design K2 13M
4. technologies (e.g., block-level, file-level, and object-level), Requirements
and how do they address different storage needs?
How do virtual clusters enhance resource utilization and VMM Design K3 13M
5. Requirements
scalability in cloud or data center environments?
What is the difference between Docker Hub and a private Physical versus K2 13M
6. Virtual Clusters
Docker registry?
How does Docker use Docker images to create Docker Physical versus K2 13M
7. Virtual Clusters
containers, and what is the process involved in this creation?
Virtual clusters K2 13M
What is Docker Hub, and how does it facilitate the sharing and
8. and Resource
distribution of Docker images?
Management
Discuss about the primary advantages of using application Virtual clusters K3 13M
9. virtualization over traditional application deployment and Resource
methods? Management
Virtual clusters K2 13M
Mention the key advantages of storage virtualization for
10. and Resource
managing data storage systems?
Management

UNIT IV CLOUD DEPLOYMENT ENVIRONMENT

Designing and Implementing a Data Center-Based Cloud Installing Open Source Cloud service. Virtual Box –
Eucalyptus Public Cloud Platforms: Google App Engine, Amazon Web Services (AWS). Google Cloud Platform.
Emerging Cloud Software Environments.

PART – A

BT
Q.No Questions Topic Mark
Level

Google App
1. What is Google App Engine? Engine K1 2M

What programming languages are supported by Google App Google App 2M


2. Engine K2
Engine?
What is the difference between Standard and Flexible Google App 2M
3. Engine K2
environments in Google App Engine?
Google App 2M
4. How does Google App Engine handle scaling? Engine K1

Google App 2M
5. What are some common use cases for Google App Engine? Engine K2

Amazon AWS 2M
6. What is AWS? K1
Amazon AWS 2M
7. What is Amazon EC2? K1

Amazon AWS 2M
8. What is S3 in AWS? K1

Amazon AWS 2M
9. What is AWS Lambda? K2

Amazon AWS 2M
10. Give the structure of the AWS Free Tier? K2

Amazon AWS 2M
11. Define Amazon DynamoDB? K2

Microsoft Azure 2M
12. What is Microsoft Azure? K2

How does Azure Virtual Machines differ from Azure App Microsoft Azure 2M
13. K2
Services?
Microsoft Azure 2M
14. How would you deploy a scalable web application on Azure? K1

What are the differences between Azure Blob Storage and Microsoft Azure 2M
15. K1
Azure File Storage?
What factors would you consider when choosing between Microsoft Azure 2M
16. K2
Azure SQL Database and Azure Cosmos DB?
Cloud Software 2M
17. What are cloud software environments? Environments K1

Cloud Software 2M
18. What are the three main types of cloud environments? Environments K2

Cloud Software 2M
19. What is SaaS in cloud computing? Environments K2

Cloud Software 2M
20. How does a PaaS environment differ from IaaS? Environments K2

Cloud Software 2M
21. What is a multi-cloud environment? Environments K2

Cloud Software 2M
22. What are the benefits of using a cloud environment? Environments K2

Cloud Software 2M
23. What role does virtualization play in cloud environments? Environments K1

Eucalyptus 2M
24. What is Eucalyptus in cloud computing? K2
Eucalyptus 2M
25. Who developed Eucalyptus? K2

Eucalyptus K1 2M
26. Mention the main purpose of Eucalyptus?

Eucalyptus K1 2M
27. Give the key components of Eucalyptus?

Eucalyptus K1 2M
28. How does Eucalyptus support hybrid cloud computing?

OpenStack 2M
29. What is OpenStack? K2

OpenStack K1 2M
30. Who are the main contributors to OpenStack?

OpenStack K1 2M
31. What are the core components of OpenStack?

OpenStack K1 2M
32. What is the role of the Nova component in OpenStack?

OpenStack K2 2M
33. How does OpenStack handle networking?

PART – B
What are the key considerations for migrating an on-premises Google App K2
1. application to Google App Engine, and how can organizations Engine 13M
ensure a smooth transition?
In what scenarios would you choose Google App Engine's Google App K3 13M
2. Standard environment over the Flexible environment, and vice Engine
versa?
How does AWS support hybrid cloud architectures, and what Amazon AWS K3 13M
3. are the best practices for integrating on-premises infrastructure
with AWS services?
Impact the design and deployment of highly available and Amazon AWS K2 13M
4.
fault-tolerant applications?
What are the best practices for securing an Azure environment, K2 13M
5. including identity management, network security, and Microsoft Azure
compliance with industry standards?
What are the architectural differences between Infrastructure K1 13M
Cloud Software
6. as a Service (IaaS), Platform as a Service (PaaS), and Software
Environments
as a Service (SaaS).
What are the advantages and limitations of using serverless Cloud Software K1 13M
7.
platforms for various types of workloads? Environments
What are the main architectural components of Eucalyptus, Eucalyptus K1 13M
8.
and how do they interact to provide cloud services?
Explain the advantages and limitations of using Eucalyptus for Eucalyptus K1 13M
9.
storage-intensive applications?
Enumerate the core components of OpenStack, and how do Open Stack K2 13M
10.
they interact to provide a complete cloud computing platform?

UNIT V CLOUD SECURITY

Cloud Security Infrastructure Security Network level security- Host level security, Application level security- Data
privacy and security Issues. Access Control and Authentication in cloud computing, IAM Security Standards

PART – A

BT
Q.No Questions Topic Mark
Level

Cloud
1. Define guest hopping in virtualization? Security K1 2M

How can guest hopping pose security risks in a virtualized Cloud 2M


2. Security K1
environment?
List some common methods attackers use to perform guest Cloud 2M
3. Security K1
hopping?
Write the measures can be taken to mitigate the risk of guest Cloud 2M
4. Security K1
hopping?
Infrastructure 2M
5. How does proper VM isolation help prevent guest hopping? Security K1

Infrastructure 2M
6. Define VM migration attack? Security K1

What are the potential risks associated with VM migration Infrastructure 2M


7. Security K1
attacks?
Infrastructure 2M
8. How can attackers exploit vulnerabilities during VM migration? Security K1

List the security measures can be implemented to protect against Infrastructure 2M


9. Security K1
VM migration attacks?
How does encrypting VM migration traffic help mitigate Host level 2M
10. security K1
migration attack risks?
Host level 2M
11. What is hyperjacking? security K1

How does a hyperjacking attack compromise a virtualized Host level 2M


12. security K1
environment?
What are the potential consequences of a successful hyperjacking Application 2M
13. level security K1
attack?
Application 2M
14. Define guest hopping in virtualization? level security K1

How can guest hopping pose security risks in a virtualized Application 2M


15. level security K1
environment?
List some common methods attackers use to perform guest Data privacy 2M
16. and security K1
hopping?
Issues
Write the measures can be taken to mitigate the risk of guest Data privacy 2M
17. and security K1
hopping?
Issues
Data privacy 2M
18. How does proper VM isolation help prevent guest hopping? and security K1
Issues
Data privacy 2M
19. What is data encryption and why is it important? and security K2
Issues
IAM Security 2M
20. Give the two main types of data encryption? Standards K1

IAM Security K1 2M
21. What is data masking and how is it used in data security? Standards
IAM Security K1 2M
22. Mention the key principles of data access control? Standards
IAM Security K1 2M
23. Define Data Loss Prevention (DLP) strategy? Standards
IAM Security K1 2M
24. How does a RAID configuration enhance data storage reliability? Standards
What is the purpose of an access control list (ACL) in data IAM Security K1 2M
25. Standards
storage?
PART – B
Virtualization K2
1. How does virtualization impact system performance? System 13M

Virtualization K2 13M
2. Enumerate the licensing and cost implications of virtualization? System

Guest K2 13M
3. Explain the functions of guest hopping. hopping

How does network segmentation and isolation help in preventing Guest K2 13M
4. hopping
guest hopping?
What role do hypervisors and virtualization management tools VM migration K3 13M
5. attack
play in preventing VM migration attacks?
Explain the implications of VM migration attacks for compliance VM migration K2 13M
6. attack
and regulatory requirements?
How can data redundancy and replication be used to enhance Data Security K2 13M
7. and Storage
storage reliability?
How can data be protected from unauthorized access? Explain Data Security K2 13M
8. and Storage
with respect to access controls.
How can you implement single sign-on (SSO) and federated IAM K2 13M
9.
identity management?

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy