Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
11 views8 pages

Cloud Computing Predicted Question

The document provides a comprehensive overview of cloud computing concepts, including definitions of key terms such as cloud computing, cloud interoperability, and various service models (IaaS, PaaS, SaaS). It also discusses important characteristics of cloud computing, disaster recovery processes, virtualization types, and policy implementation. Additionally, it outlines the differences between public, private, and hybrid cloud models, as well as the roles of encryption and digital certificates in cloud security.

Uploaded by

blitzspike7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views8 pages

Cloud Computing Predicted Question

The document provides a comprehensive overview of cloud computing concepts, including definitions of key terms such as cloud computing, cloud interoperability, and various service models (IaaS, PaaS, SaaS). It also discusses important characteristics of cloud computing, disaster recovery processes, virtualization types, and policy implementation. Additionally, it outlines the differences between public, private, and hybrid cloud models, as well as the roles of encryption and digital certificates in cloud security.

Uploaded by

blitzspike7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Predicted 2-Mark Questions recover from failures or disruptions and continue

providing services with minimal downtime.


1. Define cloud computing.
Cloud computing is the delivery of computing 10. Define SSO (Single Sign-On).
services such as servers, storage, databases, SSO is an authentication mechanism that allows a
networking, software, and analytics over the user to access multiple applications or systems
internet ("the cloud") to offer scalable, on-demand with a single set of login credentials.
resources with pay-as-you-go pricing.
11. What is DaaS and where is it used?
2. What is cloud interoperability? DaaS (Desktop as a Service) delivers virtual
Cloud interoperability refers to the ability of desktops over the cloud. It is used in remote work,
different cloud systems, services, or platforms to education, and businesses for secure, scalable
work together seamlessly, enabling data and desktop access.
application portability across multiple cloud
environments. 12. State difference between SAN and NAS.
SAN (Storage Area Network) provides block-
3. Name three types of cloud deployment level storage accessed via high-speed networks,
models. ideal for databases. NAS (Network Attached
Public cloud, private cloud, and hybrid cloud. Storage) provides file-level storage accessed over
standard networks, suitable for file sharing.
4. What is the difference between IaaS and
PaaS? 13. What are deterrent controls?
IaaS (Infrastructure as a Service) provides Deterrent controls are security measures (e.g.,
virtualized computing resources like servers and warnings, policies) designed to discourage
storage (e.g., AWS EC2), while PaaS (Platform as potential attackers from attempting unauthorized
a Service) offers a platform for developing and actions.
deploying applications without managing
underlying infrastructure (e.g., Google App 14. What is a digital certificate?
Engine). A digital certificate is an electronic document that
verifies the identity of an entity (e.g., a user or
5. Define virtualization and VMM. server) using public key cryptography.
Virtualization is the creation of virtual versions of
resources like servers or storage. VMM (Virtual 15. Define encryption and decryption.
Machine Monitor), or hypervisor, is software that Encryption converts data into a secure, unreadable
manages and runs virtual machines. format using an algorithm and key. Decryption
reverses this process to make data readable again.
6. What does RPO and RTO stand for?
RPO (Recovery Point Objective) is the maximum 16. What is VPN tunneling?
data loss acceptable during a disaster. RTO VPN tunneling is a secure method of transmitting
(Recovery Time Objective) is the maximum time data over the internet by encapsulating it within an
a system can be down before recovery. encrypted connection between a user and a
network.
7. Mention any three cloud computing
characteristics. 17. What is cloud federation?
On-demand self-service, scalability, and resource Cloud federation is the interconnection of multiple
pooling. cloud environments to share resources, enabling
seamless workload distribution and
8. Define agility in cloud computing. interoperability.
Agility refers to the ability of cloud systems to
quickly adapt to changing business needs by 18. Name any three companies offering PaaS.
provisioning or scaling resources rapidly. Microsoft (Azure App Service), Google (Google
App Engine), and Amazon (AWS Elastic
9. What is resilience in cloud computing? Beanstalk).
Resilience is the ability of a cloud system to
19. Define storage virtualization. • Broad network access: Services are
Storage virtualization abstracts physical storage accessible over the internet across diverse
into a logical pool, simplifying management and devices, such as laptops, smartphones, or
enabling flexible allocation across systems. tablets, ensuring global reach (e.g.,
accessing Google Workspace from any
20. What is map-reduce? device).
MapReduce is a programming model for • Resource pooling: Providers pool
processing large datasets in parallel across a resources (e.g., servers, storage) to serve
distributed cluster, consisting of "map" (data multiple users, dynamically allocating
filtering) and "reduce" (data aggregation) phases. them based on demand, which optimizes
utilization (e.g., multi-tenant environments
21. Define server virtualization. in Azure).
Server virtualization divides a physical server into • Rapid elasticity: Resources can scale up or
multiple virtual servers, each running its own down automatically to match workload
operating system and applications, managed by a changes, ensuring performance during
hypervisor. peak times (e.g., auto-scaling in AWS
during traffic spikes).
22. Name the layers of Hadoop architecture. • Measured service: Usage is monitored, and
HDFS (Hadoop Distributed File System), YARN users are billed only for what they
(Yet Another Resource Negotiator), and consume, promoting cost efficiency (e.g.,
MapReduce. pay-per-use billing in Google Cloud).
These characteristics collectively reduce
23. What is cloud adoption? costs, enhance scalability, and improve
Cloud adoption is the process of integrating cloud accessibility, making cloud computing
computing services into an organization’s IT suitable for businesses of all sizes. For
strategy to enhance efficiency, scalability, and example, a startup can leverage AWS’s
cost-effectiveness. elastic resources to handle growth without
upfront hardware investments.
24. List two benefits of cloud scalability.
Cost efficiency (pay only for resources used) and 2. Explain the concept of cloud adoption with
ability to handle varying workloads without advantages.
infrastructure changes. Cloud adoption involves transitioning IT
workloads to cloud platforms. It includes
25. What is the difference between VLAN and assessing needs, selecting services, and migrating
VSAN? applications.
VLAN (Virtual Local Area Network) segments Advantages:
network traffic logically for better management
and security. VSAN (Virtual Storage Area • Cost savings: Pay-as-you-go models
Network) virtualizes storage resources, isolating reduce capital expenditure.
storage traffic for efficiency. • Scalability: Easily adjust resources to meet
demand.
Predicted 5-Mark Questions • Accessibility: Access services globally via
the internet.
1. Outline the characteristics of cloud • Maintenance: Providers handle updates
computing. and infrastructure management.
Cloud computing is defined by five essential This enhances business agility and
characteristics as per NIST, which enable its innovation. For instance, a retail company
flexibility and efficiency: can adopt AWS to scale its e-commerce
platform during holiday seasons, reducing
• On-demand self-service: Users can costs and improving customer experience.
provision resources like storage or
compute power instantly via a web
interface without human interaction with
the provider (e.g., launching an AWS EC2
instance).
3. Describe the different types of service models loss using tools like AWS Elastic Disaster
in cloud computing. Recovery. For example, a financial firm
Cloud computing offers three primary service can replicate its trading platform across
models, each catering to different levels of control AWS regions to ensure continuity during
and management: outages.

• Infrastructure as a Service (IaaS): Provides 5. Describe the cloud ecosystem and its role.
virtualized infrastructure, such as servers, The cloud ecosystem comprises providers, users,
storage, and networking, where users third-party vendors, and technologies interacting
manage the operating system and to deliver cloud services. Components include:
applications. For example, AWS EC2
allows users to configure virtual machines, • Providers: Offer IaaS, PaaS, SaaS (e.g.,
offering flexibility for custom AWS, Azure).
deployments but requiring more • Users: Businesses or individuals
administrative effort. consuming services.
• Platform as a Service (PaaS): Delivers a • Vendors: Provide tools for security,
platform for developing and deploying monitoring, or integration.
applications, abstracting infrastructure Role: Enables scalable, flexible IT
management. Developers focus on coding solutions, fosters innovation, reduces
and deployment, while the provider costs, and supports global collaboration
handles servers and updates (e.g., Google through interconnected services. For
App Engine supports rapid app instance, a company using Azure for
development with built-in scaling). PaaS is computing and Okta for identity
ideal for developers seeking efficiency. management benefits from an integrated
• Software as a Service (SaaS): Offers fully ecosystem.
managed software accessible via the
internet, requiring no user management 6. Compare public, private, and hybrid cloud
beyond configuration. For instance, models.
Salesforce provides CRM tools where Cloud deployment models—public, private, and
users only interact with the application hybrid—differ in ownership, access, and use
interface, making it user-friendly for non- cases:
technical users.
Each model shifts more responsibility to • Public Cloud: Infrastructure is owned by a
the provider from IaaS to SaaS, impacting provider and shared among multiple
control, cost, and ease of use. For example, tenants (e.g., Microsoft Azure).
a company might use IaaS for custom Advantages: Cost-effective due to pay-as-
databases, PaaS for app development, and you-go pricing, highly scalable, and no
SaaS for email services, optimizing its IT maintenance burden. Disadvantages:
strategy. Limited control over data and
infrastructure, raising security concerns for
4. Explain the working of disaster recovery in sensitive applications (e.g., unsuitable for
cloud. regulated industries like healthcare).
Disaster recovery (DR) in the cloud ensures • Private Cloud: Dedicated infrastructure for
business continuity during disruptions. It involves: a single organization, hosted on-premises
or by a provider (e.g., VMware vSphere).
• Data backup: Storing data copies in Advantages: Enhanced security,
geographically dispersed cloud regions. compliance, and customization for specific
• Replication: Syncing applications and data needs. Disadvantages: High upfront costs
to secondary sites. and complex management, limiting
• Failover: Switching to backup systems scalability for smaller firms.
during failures. • Hybrid Cloud: Integrates public and
• Failback: Restoring primary systems post- private clouds, allowing data and
recovery. applications to move between them (e.g.,
Cloud DR is cost-effective, scalable, and AWS Outposts). Advantages: Balances
automated, minimizing downtime and data cost and security, enabling sensitive
workloads on private clouds and scalable • Resource Policies: Control resource
tasks on public clouds. Disadvantages: allocation and usage (e.g., setting auto-
Complex integration and potential data scaling thresholds to manage costs).
transfer costs. • Compliance Policies: Ensure adherence to
For example, a bank might use a private regulations like GDPR or HIPAA (e.g.,
cloud for customer data and a public cloud mandating data encryption).
for marketing analytics, leveraging hybrid For example, a healthcare provider might
cloud for seamless operations. The choice implement a compliance policy to encrypt
depends on security needs, budget, and patient data in AWS S3, ensuring HIPAA
scalability requirements. compliance. Effective policy
implementation enhances security,
7. Explain virtualization types in cloud optimizes resources, and mitigates risks in
computing. cloud environments.
Virtualization creates virtual resources from
physical ones. Types include: 9. Explain the architecture of cloud computing.
Cloud computing architecture consists of:
• Server virtualization: Splits a server into
multiple VMs (e.g., VMware). • Front-end: User interface (e.g., web
• Storage virtualization: Pools storage into a portals) for accessing services.
logical unit (e.g., SAN). • Back-end: Infrastructure like servers,
• Network virtualization: Creates virtual storage, and networks managed by
networks (e.g., VLANs). providers.
• Desktop virtualization: Delivers virtual • Cloud services: IaaS, PaaS, SaaS layers.
desktops (e.g., Citrix). • Management layer: Handles orchestration,
• Application virtualization: Runs apps in monitoring, and billing.
isolated environments. • Network: Ensures connectivity (e.g.,
These enhance resource utilization and internet, VPNs).
flexibility in clouds. For example, AWS This modular design supports scalability
uses server virtualization to host multiple and accessibility. For example, AWS’s
customer VMs on a single server, architecture allows users to access EC2
optimizing costs. (IaaS) via a web console while the
provider manages underlying hardware.
8. Describe policy implementation and classify
policy types. 10. Compare encryption and digital certificates
Policy implementation in cloud computing in cloud security.
involves defining, enforcing, and monitoring rules Encryption and digital certificates are critical for
to ensure governance, security, and compliance. cloud security but serve distinct purposes:
The process includes:
• Encryption: Converts data into an
• Policy Definition: Create rules based on unreadable format to ensure
organizational needs (e.g., access confidentiality. It includes:
restrictions). o Symmetric Encryption: Uses one
• Automation: Use tools like AWS IAM or key (e.g., AES for fast data
Azure Policy to enforce rules encryption in AWS S3).
automatically (e.g., restricting S3 bucket o Asymmetric Encryption: Uses
access). public-private key pairs (e.g., RSA
• Monitoring: Track compliance with tools for secure data exchange).
like AWS Config to detect violations. Encryption protects data at rest
• Updates: Regularly revise policies to (e.g., database backups) and in
address new threats or regulations. transit (e.g., HTTPS traffic),
Policy Types: preventing unauthorized access.
• Security Policies: Govern access and data o Digital Certificates: Electronic
protection (e.g., requiring MFA for cloud documents verifying the identity of
console access). entities using public key
infrastructure (PKI). Issued by
Certificate Authorities (e.g., Let’s High Availability: Ensures systems remain
Encrypt), they enable secure operational during failures.
connections via SSL/TLS (e.g., Benefits:
securing a website on AWS
CloudFront). Certificates ensure • Minimizes downtime via redundancy (e.g.,
authenticity and trust. multi-AZ deployments in AWS).
Comparison: Encryption focuses • Boosts reliability for critical applications.
on data confidentiality, while Together, they ensure efficient,
digital certificates ensure identity uninterrupted cloud services. For example,
verification and secure an e-commerce site uses AWS ELB to
communication. For example, a distribute traffic and multi-AZ setups to
cloud app might use encryption to stay online during server failures.
protect user data and a digital
certificate for HTTPS to Predicted 10-Mark Questions
authenticate the server. Challenges:
Encryption requires key 1. Explain cloud computing reference model
management; certificates need with diagram. Describe its layers.
timely renewal. Both are essential The cloud computing reference model outlines the
for a robust cloud security strategy, structure of cloud services and their interactions.
complementing each other to Diagram Description: Imagine a layered pyramid:
protect data and communications.
• Bottom: Infrastructure Layer (servers,
11. Classify server virtualization and explain storage, networks).
with examples. • Middle: Platform Layer (development
Server virtualization divides a physical server into tools, databases).
virtual machines. Types:
• Top: Software Layer (end-user
applications).
• Full virtualization: VMs emulate
• Cross-cutting: Management and Security
hardware, running unmodified OS (e.g.,
Layer (orchestration, authentication).
VMware ESXi).
Layers:
• Para-virtualization: VMs use modified OS
• IaaS: Provides virtualized infrastructure
for efficiency (e.g., Xen with
(e.g., AWS EC2). Users manage OS/apps.
paravirtualized guests).
• PaaS: Offers platforms for app
• OS-level virtualization: Containers share
development (e.g., Google App Engine).
host OS (e.g., Docker).
Users focus on coding.
Examples: AWS EC2 uses Xen for VMs;
• SaaS: Delivers ready-to-use software (e.g.,
Kubernetes uses containers. Each type
Salesforce). Users only interact with apps.
balances isolation and performance. For
instance, Docker containers are • Management/Security: Ensures
lightweight, ideal for microservices, while governance, monitoring, and protection
VMware VMs offer strong isolation for (e.g., IAM, encryption).
legacy apps. This model ensures modularity, scalability,
and user flexibility. For example, a
12. Explain the benefits of load balancing and developer uses PaaS to build an app while
high availability in cloud. the provider secures the platform via the
management layer.
Load Balancing: Distributes traffic across servers
to prevent overload. 2. Describe the types of clouds in cloud
Benefits: computing. State their advantages and
disadvantages.
Cloud types include public, private, hybrid, and
• Improves performance by optimizing
community clouds:
resource use.
• Enhances scalability by handling traffic
• Public Cloud: Shared infrastructure (e.g.,
spikes (e.g., AWS ELB).
AWS).
o Advantages: Cost-effective, Cisco DC Architecture: Cisco’s Unified
highly scalable, no Data Centre architecture integrates:
maintenance. • Unified Computing System (UCS):
o Disadvantages: Limited Combines servers, storage, and networking
control, security risks for for virtualization.
sensitive data. • Nexus Switches: High-speed, low-latency
networking.
• Private Cloud: Dedicated to one • Application Centric Infrastructure (ACI):
organization (e.g., VMware). Automates network management for
scalability.
o Advantages: High security, • Security: Firepower for threat protection.
customization. This architecture supports scalable, secure,
o Disadvantages: Expensive, and efficient cloud data centres. For
complex management. example, a cloud provider uses Cisco UCS
• Hybrid Cloud: Combines public and to manage thousands of VMs efficiently.
private.
o Advantages: Balances cost 4. Explain virtualization in detail. Types,
and security, flexible hypervisors, and their pros & cons.
workload management. Virtualization creates virtual instances of
o Disadvantages: Integration resources, enhancing efficiency.
challenges, data transfer Types:
costs.
• Community Cloud: Shared by • Server: Multiple VMs on one server (e.g.,
organizations with similar needs (e.g., VMware).
healthcare clouds). • Storage: Logical storage pools (e.g.,
o Advantages: Cost-sharing, EMC).
compliance-focused. • Network: Virtual networks (e.g., Cisco
o Disadvantages: Limited VLANs).
scalability, governance • Desktop: Virtual desktops (e.g., Citrix).
issues. • Application: Isolated app environments
For example, a university (e.g., Microsoft App-V).
might use a community Hypervisors: Software managing VMs.
cloud for research data • Type 1 (Bare-metal): Runs directly on
sharing, a public cloud for hardware (e.g., VMware ESXi, Hyper-V).
student email, and a private
cloud for sensitive records.
o Pros: High performance,
secure.
3. Define data centre in cloud computing. o Cons: Complex setup.
Explain components and Cisco DC
• Type 2 (Hosted): Runs on host OS (e.g.,
architecture.
VirtualBox).
A data centre in cloud computing is a facility
o Pros: Easy to use, flexible.
hosting servers, storage, and networking
o Cons: Lower performance.
equipment to deliver cloud services.
Virtualization improves
Components:
resource utilization but may
introduce overhead or
• Compute: Servers for processing (e.g., complexity. For example,
blade servers). AWS uses Type 1
• Storage: Disks/SSDs for data (e.g., hypervisors for EC2,
SAN/NAS). ensuring high VM
• Networking: Switches, routers for performance.
connectivity.
• Power/Cooling: Ensure uptime and
efficiency.
• Security: Firewalls, intrusion detection
systems.
5. Describe the Hadoop architecture and processing large datasets in parallel.
compare it with other systems. Explanation:
Hadoop Architecture:
• Map: Divides data into key-value pairs and
• HDFS: Distributed file system storing data processes them (e.g., counting word
across nodes. NameNode manages occurrences).
metadata; DataNodes store data. • Reduce: Aggregates map outputs (e.g.,
• YARN: Resource manager allocating summing word counts).
resources. ResourceManager schedules Diagram Description: Visualize a
tasks; NodeManagers execute them. flowchart:
• MapReduce: Processes data via map • Input data splits into chunks.
(filtering) and reduce (aggregation) tasks. • Map tasks process chunks in parallel,
• Hadoop Common: Utilities supporting producing key-value pairs.
other modules. • Shuffle phase groups pairs by key.
Comparison: • Reduce tasks aggregate results, producing
• Hadoop vs. Spark: Spark is faster (in- final output.
memory processing) but resource- Workflow: Data is distributed across
intensive; Hadoop is slower (disk-based) nodes, processed by mappers, shuffled,
but cost-effective. and reduced. Used in Hadoop for tasks like
• Hadoop vs. RDBMS: RDBMS handles log analysis. MapReduce is scalable but
structured data with low latency; Hadoop slower than in-memory alternatives like
processes unstructured, large-scale data Spark.
with high latency.
Hadoop excels in big data analytics but is 8. Discuss the role of standards in cloud
complex to manage. For example, a computing. How do they help interoperability
retailer uses Hadoop to analyze customer and portability?
data across petabytes. Standards in cloud computing are guidelines
ensuring consistency and compatibility.
6. What is cloud security architecture? Role:
Describe its principles with relevant examples.
Cloud security architecture is a framework to • Interoperability: Standards like OVF
protect cloud environments from threats. (Open Virtualization Format) enable VMs
Principles: to run across different cloud platforms
(e.g., AWS, Azure).
• Identity Management: Authenticate users • Portability: Standards like TOSCA allow
via SSO, MFA (e.g., AWS IAM). applications to move between clouds
• Data Protection: Use encryption for data at without reconfiguration.
rest (e.g., AWS S3 encryption) and in • Security: ISO 27001 ensures consistent
transit (TLS). security practices.
• Network Security: Implement firewalls, • API Consistency: RESTful APIs
VPNs (e.g., AWS VPC). standardize service interactions.
• Incident Response: Monitor and respond to Benefits for Interoperability/Portability:
threats (e.g., AWS CloudTrail). • Seamless Integration: Standardized
• Compliance: Adhere to standards like formats (e.g., JSON) enable data
GDPR, HIPAA. exchange.
Examples: AWS uses shared responsibility • Vendor Neutrality: Avoid lock-in by
model (provider secures infrastructure, supporting multi-cloud deployments.
users secure data). Azure Sentinel provides • Cost Efficiency: Reduce migration costs.
AI-driven threat detection. This ensures Examples: NIST cloud standards define
confidentiality, integrity, and availability deployment models; OpenStack APIs
in clouds. ensure cross-platform compatibility.
Standards foster flexibility, reduce costs,
7. Define and explain MapReduce with and enhance cloud adoption.
architecture diagram.
MapReduce is a programming model for

You might also like