Cs435 Final Term Files
Cs435 Final Term Files
116 288.
Important MCQS
1. MCQ: MTBF stand for______________.
11. MCQ : The best option is to move the data center to ______.
12. MCQ: It is a third party process of finding the appropriate Cloud provider.
20. The forensic analysis of _________is the responsibility of the consumer. Correct
Answers: laaS
21. The forensic analysis for ______________is the responsibility of the provider. Correct
Answers: SaaS
22. ______are usually related to quality metrics such as performance, reliability and
maintainability.
28. initial investment regarding IT resource acquiring and installations are Called ?
32. The _________scheduling can achieve low cost and meet deadline if negotiation is successful.
Correct Answers: bargain-based
33. ___________is the process of perfecting an algorithm to make it more beneficial. Correct
Answer: Optimization
34. The Cloud computing and Mobile Cloud computing are dependent upon ________usage of IT
resources offered by Cloud.
Correct Answers: remote
35. In case of Cloud computing, the providers of IaaS and PaaS manage to provide
_________uptime through server redundancy and failover systems.
Correct Answers: 99.9%
37. Consumers should consider the use of advanced procedures for ________provided by some
providers to avoid account hijacking or identity thefts.
Correct Answers: authentications
38. _______resource scheduling prioritizes the processing deadline of the users’ requests.
Correct Answers: Time-Based Resource
39. Include the running costs of the IT resources e.g., licensing fee, electricity, insurance and labor.
Correct Answer: On-going Costs
43. Cloud not only provides the facility of data access over the Internet.
Correct Answer: RIDA
44. The ________is configured to use all the redundant NIC. Correct Answers: virtual
switch Big data and Characteristics :
Big Data can be: Big data is a set of techniques and technologies that require new forms of
integration to uncover large hidden values from large datasets that are diverse, complex, and
of a massive scale.
The following are the three generic characteristics of big data:
➢ Data volume is huge
➢ Data may not be categorized into regular relational databases ➢ The data is
generated, captured and processed at high speed.
1._____________
2._____________
3._____________
4._____________
Question: Accomplishment of using speed communication links for connecting cluster it resources.
High speed communication links are used to connect the clustered IT resources for:
➢ Workload distribution
➢ Task scheduling
➢ Data sharing
➢ System synchronization
What is Cryptography?
➢ Privacy
➢ Authentication
➢ Integrity
➢ Non-repudiation: A mechanism to prove the originality of the sender.
➢ Exchange of crypto keys which are the strings of bits used to change the format of the
data.
➢ Execution cost
➢ Execution time
➢ Energy consumption
➢ Market competition
➢ Overhead occurred during design, deployment and operations of the service
➢ Cost reduction considerations through increased sharing of IT resources
➢ Server Cluster
➢ Database Cluster
➢ Large Dataset Clusters
➢
➢ Capacity planning
➢ Provision and releasing IT resources for on-demand usage
➢ Configure and setting cloud services
➢ Managing user accounts, security credentials, authorization and access control
➢ Monitor cloud service status, usage and performance
➢ Incompatible APIs
➢ Data format in-compatibility
➢ Consolidation
➢ Upgrade/Downgrade
➢ Cloud migration
➢ Disaster recovery
➢ Load balancing
➢ Cost Optimization
➢ Load balancing
➢ Performance and scalability of IT-resources
➢ Availability and reliability of IT resources
In Dynamic Failure Detection and Recovery Architecture, The resilient watchdog module
performs the following five core functions:
➢ Monitoring
➢ Identifying an event
➢ Executing the reactive routine/s
➢ Reporting
➢
➢ Network Dependence
➢ Safety-Critical Processing
[ Cloud Consumer’s Perspective ] The administrative rights of the IaaS consumer includes,
controlling of:
➢
➢ Passwords and credentials
➢ Costs
[ Cloud Consumer’s Perspective ] The administrative rights of the PaaS consumer includes,
controlling of:
➢ Upfront Costs
➢ On-going Costs
➢
Cost management can take place across the lifecycle phases of Cloud services. These phases
may include:
➢ Market competition
➢ Overhead occurred during design, deployment and operations of the service
➢ Cost reduction considerations through increased sharing of IT resources
➢
The key terminologies of privacy are:
➢ Data subject
➢ Data processor
➢ Data controller
➢ Soft trust
➢ Privacy
➢ Integrity
➢ Authentication
➢ Non-repudiation (A mechanism to prove the originality of the sender)
➢ Exchange of crypto keys which are the strings of bits used to change the format of the
data
➢ Insufficient authorization
https://chat.whatsapp.com/GecIrau2Nit0D4F5DjDiGM
➢ Traffic eavesdropping
➢ Malicious intermediary
➢ Overlapping trust boundaries
➢ Symmetric Encryption
➢ Asymmetric Encryption
➢ Network Dependence
➢ Safety-Critical Processing
➢ Accessibility
➢ Audit
➢ Availability
➢ Maintainability
➢ Backup
➢ Resource provisioning
➢ Resource scheduling
https://chat.whatsapp.com/GecIrau2Nit0D4F5DjDiGM
Effective resource scheduling reduces:
➢ Energy consumption
➢ Execution time
➢ Execution cost
➢ Security
➢ Availability
➢ Reliability
➢ Scalability
➢ Static
➢ Dynamic
➢ Value
➢ Volume
➢ Velocity
➢ Variety
https://chat.whatsapp.com/GecIrau2Nit0D4F5DjDiGM
Software Defined Networking (SDN) has four characteristics:
➢ Standardized APIs
➢ Centralization of control plane
➢ Programmable control plane
➢ Separation of control and data planes
➢ Networking module
➢ Input module
➢ Rendering module
➢ Game logic module
https://chat.whatsapp.com/GecIrau2Nit0D4F5DjDiGM