CCS335 - Cloud Computing - QUESTION BANK
CCS335 - Cloud Computing - QUESTION BANK
Cloud Architecture: System Models for Distributed and Cloud Computing – NIST Cloud Computing Reference
Architecture – Cloud deployment models – Cloud service models; Cloud Infrastructure: Architectural Design of
Compute and Storage Clouds – Design Challenges
PART - A
1. Explain the cloud service models (IaaS, PaaS, SaaS) and their applications in 1 5 16
various domains.
2. Discuss the NIST Cloud Computing Reference Architecture and its significance 1 5 16
in cloud computing.
3. Analyze the role of cloud deployment models in meeting diverse business 1 5 16
needs, with a focus on public, private, hybrid, and community clouds.
4 Illustrate the importance of cloud service models in enabling efficient resource 1 5 16
utilization and scalability, and discuss their impact on the IT industry.
UNIT – 2 - VIRTUALIZATION BASICS
Virtual Machine Basics – Taxonomy of Virtual Machines – Hypervisor – Key Concepts – Virtualization structure
– Implementation levels of virtualization – Virtualization Types: Full Virtualization – Para Virtualization –
Hardware Virtualization – Virtualization of CPU, Memory and I/O devices.
PART - A
1. What is a Hypervisor? Explain its types and the significance of each type in 2 2 16
virtualization.
2. Describe the different implementation levels of virtualization. 2 2 16
4 Explain how virtualization is achieved for CPU, memory, and I/O devices. 2 2 16
Illustrate with relevant examples.
PART - A
Google App Engine – Amazon AWS – Microsoft Azure; Cloud Software Environments – Eucalyptus – OpenStack.
PART - A
Virtualization System-Specific Attacks: Guest hopping – VM migration attack – hyperjacking. Data Security and
Storage; Identity and Access Management (IAM) - IAM Challenges - IAM Architecture and Practice.
PART – A
1. List the virtualization system specific attacks and explain any two of them 5 2 16
2. Write a note about guest hopping and VM Migration attacks. Provide real time 5 2 16
case studies for the same
3. Write a detailed note on cloud security 5 2 16
4 What is Identity and Access Management? Describe its architecture. Depict the 5 2 16
procedure to carry out IAM in AWS cloud platform.