CCS335 QN Bank

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

PRATHYUSHA ENGINEERING COLLEGE

DEPARTMENT OF INFORMATION TECHNOLOGY


QUESTION BANK (VII SEM)
CCS335 – CLOUD COMPUTING
Unit I: Cloud Architecture Models and Infrastructure
Part A (2 Marks)
1. Define cloud computing.
2. What is the NIST Cloud Computing Reference Architecture?
3. List the different cloud deployment models.
4. Name the key cloud service models.
5. What is the purpose of cloud computing?
6. Describe the main components of cloud infrastructure.
7. What are the benefits of using cloud computing for businesses?
8. Identify the core characteristics of cloud services.
Part B (16 Marks)
1. Explain the system models for distributed and cloud computing.
2. Describe the architectural design of compute clouds.
3. What are the main design challenges in cloud architecture?
4. Discuss the differences between cloud deployment models.
5. Apply the NIST Cloud Computing Reference Architecture to a hypothetical cloud
service scenario.
6. Show how different cloud service models can be used in a given business case.
7. Illustrate the architectural design of a storage cloud with examples.
8. Demonstrate how to address a common design challenge in cloud computing.
9. Compare and contrast the different cloud deployment models.
10. Analyze the impact of design challenges on the performance of cloud services.
11. Break down the components of a cloud infrastructure design and their interactions.
12. Evaluate the suitability of different cloud service models for various business needs.
13. Assess the effectiveness of the NIST Cloud Computing Reference Architecture in
ensuring cloud service quality.
14. Evaluate the benefits and limitations of different cloud deployment models.
15. Critique a cloud infrastructure design for its ability to handle scalability and
reliability.
16. Judge the impact of cloud architecture on overall business performance.

Unit II: Virtualization Basics


Part A (2 Marks)
1. What is a virtual machine?
2. Define hypervisor.
3. List the types of virtualization.
4. Name the key components of virtualization structure.
5. What is the role of a hypervisor in virtualization?
6. Describe the concept of virtualized hardware.
7. What is para virtualization?
8. Identify the differences between full virtualization and hardware virtualization.
Part B (16 Marks)
1. Describe the taxonomy of virtual machines.
2. Explain the concept of full virtualization.
3. What are the key differences between para virtualization and hardware virtualization?
4. Discuss the various implementation levels of virtualization.
5. Show how to set up Docker containers for a given application.
6. Apply the concept of hypervisor to implement a virtual machine setup.
7. Illustrate how full virtualization can be used to create a virtual environment.
8. Demonstrate how to configure para virtualization for a specific application.
9. Compare full virtualization and para virtualization in terms of performance and use
cases.
10. Analyze the advantages and disadvantages of hardware virtualization.
11. Break down the structure of virtualization and explain how each component interacts.
12. Evaluate the impact of virtualization on system performance and resource
management.
13. Assess the effectiveness of different types of virtualization for various business needs.
14. Evaluate the performance implications of using different virtualization
implementation levels.
15. Critique a virtualization setup for its ability to efficiently utilize resources.
16. Judge the suitability of different virtual machine taxonomies for specific use cases.

Unit III: Virtualization Infrastructure and Docker


Part A (2 Marks)
1. Define desktop virtualization.
2. What is network virtualization?
3. List the Docker components.
4. Name the different types of virtualization.
5. What is a Docker container?
6. Describe the role of Docker images.
7. What is application virtualization?
8. Explain system-level operating virtualization.
Part B (16 Marks)
1. Describe system-level operating virtualization.
2. Explain the differences between containers and virtual machines.
3. What are Docker images and repositories?
4. Discuss the concept of application virtualization.
5. Show how to set up Docker containers for a given application.
6. Apply the concept of network virtualization to improve network efficiency.
7. Illustrate how to use Docker components to deploy a multi-container application.
8. Demonstrate the use of Docker images to create a consistent development
environment.
9. Compare desktop virtualization with application virtualization in terms of use cases
and benefits.
10. Analyze the advantages and disadvantages of using Docker containers versus
traditional virtual machines.
11. Break down the components of Docker and explain their roles in container
management.
12. Evaluate the impact of network virtualization on system performance and scalability.
13. Assess the effectiveness of Docker for application deployment compared to other
virtualization methods.
14. Evaluate the performance of various virtualization types in different scenarios.
15. Critique the use of Docker for scaling applications and managing resources.
16. Judge the suitability of network virtualization techniques for specific network
configurations.

Unit IV: Cloud Deployment Environment


Part A (2 Marks)
1. Name the major cloud deployment environments.
2. What is Google App Engine?
3. List the features of Amazon AWS.
4. What is Microsoft Azure?
5. Describe the core features of Google App Engine.
6. What are the benefits of using Amazon AWS?
7. Identify the key services provided by Microsoft Azure.
8. What is OpenStack?
Part B (16 Marks)
1. Describe the key features of Google App Engine.
2. Explain the differences between Amazon AWS and Microsoft Azure.
3. What is Eucalyptus and how does it relate to cloud deployment?
4. Discuss the benefits of using OpenStack in cloud environments.
5. Apply the features of Amazon AWS to design a cloud solution for a given business
requirement.
6. Show how to deploy an application using Google App Engine.
7. Illustrate how OpenStack can be used to create a private cloud environment.
8. Demonstrate the use of Microsoft Azure services to solve a specific problem.
9. Compare Google App Engine, Amazon AWS, and Microsoft Azure in terms of their
features and capabilities.
10. Analyze the advantages and limitations of using Eucalyptus for cloud deployment.
11. Break down the architecture of OpenStack and explain how its components interact.
12. Evaluate the performance and scalability of different cloud deployment environments.
13. Assess the effectiveness of Google App Engine for deploying scalable web
applications.
14. Evaluate the strengths and weaknesses of Amazon AWS and Microsoft Azure for
enterprise use.
15. Critique a cloud deployment strategy using Eucalyptus and suggest improvements.
16. Judge the suitability of different cloud software environments for various business
needs.

Unit V: Cloud Security


Part A (2 Marks)
1. What is guest hopping in virtualization security?
2. Define VM migration attack.
3. What is hyperjacking?
4. List the key components of data security and storage in cloud environments.
5. What are the common virtualization system-specific attacks?
6. Describe the role of IAM in cloud security.
7. What is the purpose of identity and access management (IAM)?
8. Identify the main challenges in IAM within cloud environments.
Part B (16 Marks)
1. Describe identity and access management (IAM).
2. Explain the IAM challenges faced in cloud environments.
3. What is IAM architecture and practice?
4. Discuss the concept of virtualization system-specific attacks.
5. Describe the measures to mitigate guest hopping attacks.
6. Illustrate how VM migration attacks can be prevented.
7. Demonstrate how hyperjacking can be detected and addressed.
8. Explain how to ensure data security and storage in a cloud environment.
9. Analyze the challenges in implementing effective IAM in cloud services.
10. Compare different IAM solutions and their effectiveness in cloud environments.
11. Evaluate the strategies for managing access and identities in a cloud-based system.
12. Assess the impact of virtualization system-specific attacks on cloud security.
13. Critique the current IAM practices and suggest improvements for cloud security.
14. Judge the effectiveness of various data security measures in protecting cloud storage.
15. Design a comprehensive IAM strategy for a cloud environment.
16. Create a security plan to address virtualization system-specific attacks and data
security.

You might also like