Cloud Computing Predicted Question
Cloud Computing Predicted Question
• Infrastructure as a Service (IaaS): Provides 5. Describe the cloud ecosystem and its role.
virtualized infrastructure, such as servers, The cloud ecosystem comprises providers, users,
storage, and networking, where users third-party vendors, and technologies interacting
manage the operating system and to deliver cloud services. Components include:
applications. For example, AWS EC2
allows users to configure virtual machines, • Providers: Offer IaaS, PaaS, SaaS (e.g.,
offering flexibility for custom AWS, Azure).
deployments but requiring more • Users: Businesses or individuals
administrative effort. consuming services.
• Platform as a Service (PaaS): Delivers a • Vendors: Provide tools for security,
platform for developing and deploying monitoring, or integration.
applications, abstracting infrastructure Role: Enables scalable, flexible IT
management. Developers focus on coding solutions, fosters innovation, reduces
and deployment, while the provider costs, and supports global collaboration
handles servers and updates (e.g., Google through interconnected services. For
App Engine supports rapid app instance, a company using Azure for
development with built-in scaling). PaaS is computing and Okta for identity
ideal for developers seeking efficiency. management benefits from an integrated
• Software as a Service (SaaS): Offers fully ecosystem.
managed software accessible via the
internet, requiring no user management 6. Compare public, private, and hybrid cloud
beyond configuration. For instance, models.
Salesforce provides CRM tools where Cloud deployment models—public, private, and
users only interact with the application hybrid—differ in ownership, access, and use
interface, making it user-friendly for non- cases:
technical users.
Each model shifts more responsibility to • Public Cloud: Infrastructure is owned by a
the provider from IaaS to SaaS, impacting provider and shared among multiple
control, cost, and ease of use. For example, tenants (e.g., Microsoft Azure).
a company might use IaaS for custom Advantages: Cost-effective due to pay-as-
databases, PaaS for app development, and you-go pricing, highly scalable, and no
SaaS for email services, optimizing its IT maintenance burden. Disadvantages:
strategy. Limited control over data and
infrastructure, raising security concerns for
4. Explain the working of disaster recovery in sensitive applications (e.g., unsuitable for
cloud. regulated industries like healthcare).
Disaster recovery (DR) in the cloud ensures • Private Cloud: Dedicated infrastructure for
business continuity during disruptions. It involves: a single organization, hosted on-premises
or by a provider (e.g., VMware vSphere).
• Data backup: Storing data copies in Advantages: Enhanced security,
geographically dispersed cloud regions. compliance, and customization for specific
• Replication: Syncing applications and data needs. Disadvantages: High upfront costs
to secondary sites. and complex management, limiting
• Failover: Switching to backup systems scalability for smaller firms.
during failures. • Hybrid Cloud: Integrates public and
• Failback: Restoring primary systems post- private clouds, allowing data and
recovery. applications to move between them (e.g.,
Cloud DR is cost-effective, scalable, and AWS Outposts). Advantages: Balances
automated, minimizing downtime and data cost and security, enabling sensitive
workloads on private clouds and scalable • Resource Policies: Control resource
tasks on public clouds. Disadvantages: allocation and usage (e.g., setting auto-
Complex integration and potential data scaling thresholds to manage costs).
transfer costs. • Compliance Policies: Ensure adherence to
For example, a bank might use a private regulations like GDPR or HIPAA (e.g.,
cloud for customer data and a public cloud mandating data encryption).
for marketing analytics, leveraging hybrid For example, a healthcare provider might
cloud for seamless operations. The choice implement a compliance policy to encrypt
depends on security needs, budget, and patient data in AWS S3, ensuring HIPAA
scalability requirements. compliance. Effective policy
implementation enhances security,
7. Explain virtualization types in cloud optimizes resources, and mitigates risks in
computing. cloud environments.
Virtualization creates virtual resources from
physical ones. Types include: 9. Explain the architecture of cloud computing.
Cloud computing architecture consists of:
• Server virtualization: Splits a server into
multiple VMs (e.g., VMware). • Front-end: User interface (e.g., web
• Storage virtualization: Pools storage into a portals) for accessing services.
logical unit (e.g., SAN). • Back-end: Infrastructure like servers,
• Network virtualization: Creates virtual storage, and networks managed by
networks (e.g., VLANs). providers.
• Desktop virtualization: Delivers virtual • Cloud services: IaaS, PaaS, SaaS layers.
desktops (e.g., Citrix). • Management layer: Handles orchestration,
• Application virtualization: Runs apps in monitoring, and billing.
isolated environments. • Network: Ensures connectivity (e.g.,
These enhance resource utilization and internet, VPNs).
flexibility in clouds. For example, AWS This modular design supports scalability
uses server virtualization to host multiple and accessibility. For example, AWS’s
customer VMs on a single server, architecture allows users to access EC2
optimizing costs. (IaaS) via a web console while the
provider manages underlying hardware.
8. Describe policy implementation and classify
policy types. 10. Compare encryption and digital certificates
Policy implementation in cloud computing in cloud security.
involves defining, enforcing, and monitoring rules Encryption and digital certificates are critical for
to ensure governance, security, and compliance. cloud security but serve distinct purposes:
The process includes:
• Encryption: Converts data into an
• Policy Definition: Create rules based on unreadable format to ensure
organizational needs (e.g., access confidentiality. It includes:
restrictions). o Symmetric Encryption: Uses one
• Automation: Use tools like AWS IAM or key (e.g., AES for fast data
Azure Policy to enforce rules encryption in AWS S3).
automatically (e.g., restricting S3 bucket o Asymmetric Encryption: Uses
access). public-private key pairs (e.g., RSA
• Monitoring: Track compliance with tools for secure data exchange).
like AWS Config to detect violations. Encryption protects data at rest
• Updates: Regularly revise policies to (e.g., database backups) and in
address new threats or regulations. transit (e.g., HTTPS traffic),
Policy Types: preventing unauthorized access.
• Security Policies: Govern access and data o Digital Certificates: Electronic
protection (e.g., requiring MFA for cloud documents verifying the identity of
console access). entities using public key
infrastructure (PKI). Issued by
Certificate Authorities (e.g., Let’s High Availability: Ensures systems remain
Encrypt), they enable secure operational during failures.
connections via SSL/TLS (e.g., Benefits:
securing a website on AWS
CloudFront). Certificates ensure • Minimizes downtime via redundancy (e.g.,
authenticity and trust. multi-AZ deployments in AWS).
Comparison: Encryption focuses • Boosts reliability for critical applications.
on data confidentiality, while Together, they ensure efficient,
digital certificates ensure identity uninterrupted cloud services. For example,
verification and secure an e-commerce site uses AWS ELB to
communication. For example, a distribute traffic and multi-AZ setups to
cloud app might use encryption to stay online during server failures.
protect user data and a digital
certificate for HTTPS to Predicted 10-Mark Questions
authenticate the server. Challenges:
Encryption requires key 1. Explain cloud computing reference model
management; certificates need with diagram. Describe its layers.
timely renewal. Both are essential The cloud computing reference model outlines the
for a robust cloud security strategy, structure of cloud services and their interactions.
complementing each other to Diagram Description: Imagine a layered pyramid:
protect data and communications.
• Bottom: Infrastructure Layer (servers,
11. Classify server virtualization and explain storage, networks).
with examples. • Middle: Platform Layer (development
Server virtualization divides a physical server into tools, databases).
virtual machines. Types:
• Top: Software Layer (end-user
applications).
• Full virtualization: VMs emulate
• Cross-cutting: Management and Security
hardware, running unmodified OS (e.g.,
Layer (orchestration, authentication).
VMware ESXi).
Layers:
• Para-virtualization: VMs use modified OS
• IaaS: Provides virtualized infrastructure
for efficiency (e.g., Xen with
(e.g., AWS EC2). Users manage OS/apps.
paravirtualized guests).
• PaaS: Offers platforms for app
• OS-level virtualization: Containers share
development (e.g., Google App Engine).
host OS (e.g., Docker).
Users focus on coding.
Examples: AWS EC2 uses Xen for VMs;
• SaaS: Delivers ready-to-use software (e.g.,
Kubernetes uses containers. Each type
Salesforce). Users only interact with apps.
balances isolation and performance. For
instance, Docker containers are • Management/Security: Ensures
lightweight, ideal for microservices, while governance, monitoring, and protection
VMware VMs offer strong isolation for (e.g., IAM, encryption).
legacy apps. This model ensures modularity, scalability,
and user flexibility. For example, a
12. Explain the benefits of load balancing and developer uses PaaS to build an app while
high availability in cloud. the provider secures the platform via the
management layer.
Load Balancing: Distributes traffic across servers
to prevent overload. 2. Describe the types of clouds in cloud
Benefits: computing. State their advantages and
disadvantages.
Cloud types include public, private, hybrid, and
• Improves performance by optimizing
community clouds:
resource use.
• Enhances scalability by handling traffic
• Public Cloud: Shared infrastructure (e.g.,
spikes (e.g., AWS ELB).
AWS).
o Advantages: Cost-effective, Cisco DC Architecture: Cisco’s Unified
highly scalable, no Data Centre architecture integrates:
maintenance. • Unified Computing System (UCS):
o Disadvantages: Limited Combines servers, storage, and networking
control, security risks for for virtualization.
sensitive data. • Nexus Switches: High-speed, low-latency
networking.
• Private Cloud: Dedicated to one • Application Centric Infrastructure (ACI):
organization (e.g., VMware). Automates network management for
scalability.
o Advantages: High security, • Security: Firepower for threat protection.
customization. This architecture supports scalable, secure,
o Disadvantages: Expensive, and efficient cloud data centres. For
complex management. example, a cloud provider uses Cisco UCS
• Hybrid Cloud: Combines public and to manage thousands of VMs efficiently.
private.
o Advantages: Balances cost 4. Explain virtualization in detail. Types,
and security, flexible hypervisors, and their pros & cons.
workload management. Virtualization creates virtual instances of
o Disadvantages: Integration resources, enhancing efficiency.
challenges, data transfer Types:
costs.
• Community Cloud: Shared by • Server: Multiple VMs on one server (e.g.,
organizations with similar needs (e.g., VMware).
healthcare clouds). • Storage: Logical storage pools (e.g.,
o Advantages: Cost-sharing, EMC).
compliance-focused. • Network: Virtual networks (e.g., Cisco
o Disadvantages: Limited VLANs).
scalability, governance • Desktop: Virtual desktops (e.g., Citrix).
issues. • Application: Isolated app environments
For example, a university (e.g., Microsoft App-V).
might use a community Hypervisors: Software managing VMs.
cloud for research data • Type 1 (Bare-metal): Runs directly on
sharing, a public cloud for hardware (e.g., VMware ESXi, Hyper-V).
student email, and a private
cloud for sensitive records.
o Pros: High performance,
secure.
3. Define data centre in cloud computing. o Cons: Complex setup.
Explain components and Cisco DC
• Type 2 (Hosted): Runs on host OS (e.g.,
architecture.
VirtualBox).
A data centre in cloud computing is a facility
o Pros: Easy to use, flexible.
hosting servers, storage, and networking
o Cons: Lower performance.
equipment to deliver cloud services.
Virtualization improves
Components:
resource utilization but may
introduce overhead or
• Compute: Servers for processing (e.g., complexity. For example,
blade servers). AWS uses Type 1
• Storage: Disks/SSDs for data (e.g., hypervisors for EC2,
SAN/NAS). ensuring high VM
• Networking: Switches, routers for performance.
connectivity.
• Power/Cooling: Ensure uptime and
efficiency.
• Security: Firewalls, intrusion detection
systems.
5. Describe the Hadoop architecture and processing large datasets in parallel.
compare it with other systems. Explanation:
Hadoop Architecture:
• Map: Divides data into key-value pairs and
• HDFS: Distributed file system storing data processes them (e.g., counting word
across nodes. NameNode manages occurrences).
metadata; DataNodes store data. • Reduce: Aggregates map outputs (e.g.,
• YARN: Resource manager allocating summing word counts).
resources. ResourceManager schedules Diagram Description: Visualize a
tasks; NodeManagers execute them. flowchart:
• MapReduce: Processes data via map • Input data splits into chunks.
(filtering) and reduce (aggregation) tasks. • Map tasks process chunks in parallel,
• Hadoop Common: Utilities supporting producing key-value pairs.
other modules. • Shuffle phase groups pairs by key.
Comparison: • Reduce tasks aggregate results, producing
• Hadoop vs. Spark: Spark is faster (in- final output.
memory processing) but resource- Workflow: Data is distributed across
intensive; Hadoop is slower (disk-based) nodes, processed by mappers, shuffled,
but cost-effective. and reduced. Used in Hadoop for tasks like
• Hadoop vs. RDBMS: RDBMS handles log analysis. MapReduce is scalable but
structured data with low latency; Hadoop slower than in-memory alternatives like
processes unstructured, large-scale data Spark.
with high latency.
Hadoop excels in big data analytics but is 8. Discuss the role of standards in cloud
complex to manage. For example, a computing. How do they help interoperability
retailer uses Hadoop to analyze customer and portability?
data across petabytes. Standards in cloud computing are guidelines
ensuring consistency and compatibility.
6. What is cloud security architecture? Role:
Describe its principles with relevant examples.
Cloud security architecture is a framework to • Interoperability: Standards like OVF
protect cloud environments from threats. (Open Virtualization Format) enable VMs
Principles: to run across different cloud platforms
(e.g., AWS, Azure).
• Identity Management: Authenticate users • Portability: Standards like TOSCA allow
via SSO, MFA (e.g., AWS IAM). applications to move between clouds
• Data Protection: Use encryption for data at without reconfiguration.
rest (e.g., AWS S3 encryption) and in • Security: ISO 27001 ensures consistent
transit (TLS). security practices.
• Network Security: Implement firewalls, • API Consistency: RESTful APIs
VPNs (e.g., AWS VPC). standardize service interactions.
• Incident Response: Monitor and respond to Benefits for Interoperability/Portability:
threats (e.g., AWS CloudTrail). • Seamless Integration: Standardized
• Compliance: Adhere to standards like formats (e.g., JSON) enable data
GDPR, HIPAA. exchange.
Examples: AWS uses shared responsibility • Vendor Neutrality: Avoid lock-in by
model (provider secures infrastructure, supporting multi-cloud deployments.
users secure data). Azure Sentinel provides • Cost Efficiency: Reduce migration costs.
AI-driven threat detection. This ensures Examples: NIST cloud standards define
confidentiality, integrity, and availability deployment models; OpenStack APIs
in clouds. ensure cross-platform compatibility.
Standards foster flexibility, reduce costs,
7. Define and explain MapReduce with and enhance cloud adoption.
architecture diagram.
MapReduce is a programming model for