0% found this document useful (0 votes)
91 views4 pages

20cs215 - Cloud Computing

Uploaded by

Naveen S
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
91 views4 pages

20cs215 - Cloud Computing

Uploaded by

Naveen S
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Revised) Regulation- 2020 (PC)

Reg. No:

SRI RAMAKRISHNA ENGINEERING COLLEGE,COIMBATORE


(Autonomous Institution, Reaccredited by NAAC with 8A+9 Grade Approved by AICTE and Permanently affiliated to Anna University, Chennai)

AUTONOMOUS EXAMINATIONS - MAY'2023


B.E - COMPUTER SCIENCE AND ENGINEERING

20CS215 - CLOUD COMPUTING


Answer ALL questions
Duration: 3 Hours Maximum: 100 Marks
PART - A (7x 1 = 7 Marks)

1. CO1 Which layer in the cloud computing stack is responsible for providing virtualized
hardware resources to users .
a) IaaS b) PaaS c) SaaS d) NaaS

2. CO1 Which of the following is a potential disadvantage in cloud computing?


a) High upfront capital costs b) Increased hardware maintenance responsibilities
c) Decreased control over data d) Limited scalability

3. CO2 Which of the following services in AWS is used for automating code deployment to
any instance, including Amazon EC2 instances and instances running on-premises
_.
a) AWS Elastic Beanstalk b) Amazon RDS c) AWS Lambda d) Amazon SNS

4. CO2 Which of the following is a benefit of virtualization in a data Center?


a) Increased hardware costs b) Reduced scalability
c) Increased power consumption d) Improved server utilization

5. CO3 Which Azure security feature provides real-time threat detection and protection for
Azure resources .
a) Azure Security Center b) Azure Active Directory (AD)
c) Azure Firewall d) Azure Key Vault

22-23-26 -1-
6. CO3 Which GCP service provides a way to manage encryption keys for data
encryption at rest .
a) Google Cloud Load Balancing b) Google Cloud Storage
c) Google Cloud IAM d) Key Management Service

7. CO4 Which of the following is NOT a command for managing Docker containers?
a) docker run b) docker start c) docker stop d) docker build

Fill in the blanks: (3x 1 = 3 Marks)


8. CO2 The in Kubernetes is responsible for scheduling and running containers on nodes in
the cluster, ensuring that the desired state of the system is maintained.
9. CO1 is a cloud computing service model where cloud resources are shared
among multiple organizations, and customer’s access and manage their own resources
through a web browser or API.
10. CO3 In virtual clusters, a is a logical representation of the resources assigned
to a specific project or team, including virtual machines, storage, and networking
resources.

PART - B (5x 3 = 15 Marks)


11. CO1 Give the concept of Platform-as-a-Service (PaaS) and give three examples of PaaS
providers.
12. CO1 List out the key components of a Service Level Agreement.
13. CO2 Enumerate the benefits of CPU virtualization.
14. CO3 What are the three major security risks posed by shared images in containerization and
how can they be mitigated?
15. CO4 Define: Container in Docker.

PART - C (5 x 15 = 75 Marks)
Q.No: 16 Compulsory Question
Q.No: 17 to 22 Answer any FOUR Questions
Compulsory Question:

16. CO1 i) Explain NIST (Network-centric IT Services) Model in detail. (8)

CO1 ii) Depict Data Center Architecture and explain. (7)

22-23-26 -2-
17. CO1 i) Give the Advantages and Disadvantages of Cloud computing. (7)
CO2 ii) Outline the problems in virtualizing in CPU, I/O and memory devices and (8)
suggest how it could be overridden for efficient utilization of cloud
services.

18. CO2 i) Describe the various levels of virtualization with an example for each (8)
category.
CO2 ii) Explain the different phenomenon that has gained an interest towards (7)
virtualization Technologies.

19. CO2 i) Illustrate the design of a large-scale Virtual Cluster System. (8)
CO3 ii) What are the key security considerations for virtual machines (VMs) in cloud (7)
computing, and how they can be addressed to ensure a secure VM
environment?

20. CO3 i) Discuss the importance of authentication in cloud computing and how it (9)
can be implemented effectively.
CO3 ii) Write the challenges and solutions for ensuring operating system security (6)
in cloud computing.

21. CO3 i) Outline your Understanding in Access Control. (7)


CO4 ii) Discuss the concept of Docker networking and the different types of networks (8)
available in Docker. Provide examples of scenarios where each type of
network would be useful.

22-23-26 -3-
22. CO4 i) Enumerate Docker commands with suitable examples and with pertinent
explanations.
CO4 ii) How to use Kubernetes in Docker (KinD) and discuss its advantages in
creating a development and testing environment.

22-23-26 -4-

You might also like