0% found this document useful (0 votes)
9 views9 pages

Cloud Computing

Introduction to Cloud computing

Uploaded by

Syrüp Crüz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
9 views9 pages

Cloud Computing

Introduction to Cloud computing

Uploaded by

Syrüp Crüz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 9
HO TECHNICAL UNIVERSITY END OF SECOND SEMESTER EXAMINATION May 2022 FACULTY: Applied Sconces & Technology DEPARTMENT: Computer Science PROGRAMME: BTech ICT (Top-Up) COURSE CODE: BICT 404 COURSE TITLE: Cioud Computing LEVEL: 400 ACADEMIC YEAR: 2021/2022 TOTAL MARKS: 60 DUR TION: 2Hours EXAHINER: Dr. M Adan INSTRUCTIONS 1. The questions are in TWO sections. Section A caries a total of $0 marks and Section B cartes a total of 30 marks. 12. Section Ais objectives. Each question in Section A carries 1 mark. White ONLY the ‘alphabet of the correct answer in the answer booklet. {3 Section B is subjective. Each question in Section B caries 10 marks. Please answer 'ANY THREE questions in section Bin the answer bookiet provided. SECTION A (30 MARKS) 4. Enity that manages the use, performance and delivery of cloud services and negotiates ‘relationships between cloud providers and cloud consumers is? ‘A) Cloud service provider B) Cloud service consumer ©) Cloud service broker ) Cloud service operator 2. An organisation that sorves as a thirc-party entity as a centralised coordinator of cloud ‘services for other organisations and enables users to interact through @ single interface with ‘Multiple service providers is? ‘A) cloud broker B) Service Arbitrage C) Cloud service provider D) Service arbiter 3. An IT role and business modal in which a compary or other ently adds value to one or ‘mare (public or private) cloud services on beh of one or more consumers ofthat service via three primary roles inclsing aggregation, integration and customisation brokerage is? *) Cloud service brokerage B) SLA-bac2¢ ) Externally r-anaged brokers ) Trigger-acton bes 4. The converse of < or. sgn end evallilty is? {A)Diselosir= eration, and Removal B) Auditing, Cnanges, sn Diciosure G) Avallabi'y. erty. ne Confdentiaty D) Alteration, Disccszie. and Cncuty 5 {is vilusi crv'onmant ‘at makes the scrices of one or more data centers available through e sinale interface and biling structure. A) Virtuaisavo0 8) Cloud ©) Data contar D) Virtual ricer 6. Each ype of cious implementation provides a afferent paradigm of and, ‘A) Control and access 8) Scalability and ) Latency and control ) On-tomand and availabilty tty 7A primary motivation for using public cloud services is that an organization can. ‘A) Provision an environment to host a web application with very Ittle Investment 8) Quickly cut down on large upfront cost to getup and running CC) Pradit the capacity of resource nesded and how much itcan grow ) Easily scale up and down ther resource needs £8, Which ofthe following is not an SMI attribute? ‘A) Financial 8) Agiity ©) Scalabity D) Assurance ©, Identity the wrong statement below: 'A) Cloud services span the gamut of computer applications 'B) The impact of cloud computing on network communication is to discourage the use of open source network protocols in place of proprietary protocol (¢) Atom ie a syndication format tat allows for HTTP protocols to create and updates Information 1D) None of the mentioned 410. Confidentiality is sometimes confused with A) Privacy. B) Authentity. ) integrity. ) Nonrapuciation, 14 refers tothe ability to identity the person or entity with whom you are dealing on the Internet ‘A) Nonrepudiation B) Althenticity| ©) Availabilty D) Integrity +412, Accessing data without authorization on Dropbox isan example of which ofthe following? ‘A) Social network security issue B) cloud security issue C) Mobile platform securly issue ) Sniting 43, Virtualization has become an indspensable ingredient for almost every Cloud; the most jbvious reasons being the ease of {A) Abstraction and encapsulation. 8) Installation and maintenance (0) Use and perceived usefulness ) Avalabilty and on-demand 14, ____refers to progressive activity that examines either the provider's system or the users of services to ensure there is no attack detection, A) Austing B) Monitoring C) Incident response ) Security testing 46. In the NIST defrition of cloud computing, what does the statement “shared pool of corfigurable computing resources” Include? ‘A)Data security, associated with los or availabilty of data causing business disruption 'B) Networks, servers, storage, applications, and services C} Five essential characteristics, three deployment models, three service models D) Leverage cloud services over the open internet on hardware owned by the cloud provider 416. Which of these are fulleervce clous platforms? (Wie all alphabets which apply to the answer) ‘A)IBM Cloud 88) Amazon Web Services } Google Cloud Platform D) Microsoft Azure A,B, and C only A.B,CandD ‘and B only Acnly 417. What is the three-way symbiotic relationship between foT, Al, and cloud? ‘A) Power, scale, dynamic nature, and economies ofthe cloud resources 88) Al consumes the data produced by loT devices 6) loT delivers that data, Al powers the insights, and both emerging technologies leverage cloud scalability and processing power D) Making sense ofthe endless streams of data from loT devices 418, Which one of the folowing options is true for inrastructute-as-a-service? ‘A) Cloud provider configures the infrastructure whic the usericustomer organization 8) Cloud provider manages the physical resources, the platform resources, ‘managed and main wed by applications, and data ©) Cloud provider owns, manages, and maintains the physical resources ) Cloud provider manages the pricical resources, operating systems, development tools, databases, and business analytics 19. Which are some of the key components of cloud Infrastructure-as-a-Service? Select two A) laaS providers manage the hypervisors and provision virtual instances 8) laaS providers manage largo data centers that contain the physical ‘machines required to power the various layers of abstraction on top of them CC) laaS providers deploy the middleware and install required applications on the virtual machines ) laaS providers manage the hypervisors and end-users provision the vitual Instances 20. Which one ofthe folowing is @ key characterises of Software-2s-a-Service? 'A) Security, compliance, and maintenance ofthe software are the responsibilities of the user B) SaaS services do not provide options for user customization CC) Single tenant architecture ) Ensure every user has access to the same, centrally located, infrastructure ‘and application code 21. Which of the following statements is NOT a correc statement about Private clouds? 1) Private clouds can be implemented intemally or externally 'B) VPC Is an example ofa type of Prvato cloud (C) Private clouds are suitable for workloads that require maximum control and security ) Private clouds can only be deployed on-premise n an organization's own atacentre sz. en eginzaton rete on aH sno andro cel epson with 22 an expan ret cpt eaten, wh be our eal wou eran curr? 1 Pull By pwat coud Gye cears Symon cas 29, Each dloud region can have mulple zones (also known as avaltlty zones), What are zones? 'A) Standardized containers of computing resources 6) Single shared point of allure {¢) Unique physical locations with one or more datacenters 1) Goographical area or region where cloud prover’ infrastructure fs clustered applications, and data Se pela our sy, ar meta pe ames >) Cloud provider manages the pical resources, operating systems, development tools, databases, and business analytics 48. Which are some of the key components of cloud Infrastructure-as-a-Service? Select two |A)laaS providers manage the hypervisors and provision virtual instances 8) laaS providers manage large data centers that contain the physical ‘machines required to pover the various layers of abstraction on top of them C) laa providers deplay the middleware and install required applications on the virtual machines ) laas providers manage the hypervsors and end-users provision the virtual instances 20, Which one ofthe following is @ Key charactristics of Software-as-a-Servce? 'A) Securty, compliance, and maintenance of the software are the responsibilities of the user 'B) Saas services do not provide options for user customization C) Single tenant architecture 1) Ensure every user has access tothe same, centrally locate, infrastructure ‘and application code ‘D1. Which ofthe following statements fs NOT a correct statement about Private clouds? 'A) Private clouds can be implemented interally or externally 8B) VPC is an example of a type of Private loud CC) Private clouds are sutable for workloads that quire maximum contol and securiy ) Private clouds can only be deployed on-premise, in an organization's own datacentre control operational assurance ‘schniques that ean be employed to ensure 4. Broly explain the two basic a ostion2 2 lust ike the 7-ayered OSF-model of data networks, cloud architecture is layered. With aid of correct diagram, explain the components ofa layered model of cloud computing. [7] ‘2b. Name and explain three cloud resource provisioning mothods a ‘a, The CIA Tad isan industry-aocepted model for ensuring secur in systems. Describe the components ofthe CIA tad. ‘6 4b, Clu security concerns can be clasted into tasitonal,avaiabilty and thie-party data contol eoncerns. Briefly explain the traditional taxonomy of cloud security concem [4] ‘Question 4 4a, Explain FOUR practices that can be used to manage privacy inthe cloud 4b. Akey feature of cloud computing is mult-tenancy. Explain FOUR advantag rmultitenancy nature of cloud computing } gos ofthe 4 4c. Broly explain multi-level service level agreement in a cloud computing environment. [2]

You might also like