100% found this document useful (1 vote)
280 views14 pages

Cs435 Final Term Files

The document contains a compilation of important multiple-choice questions (MCQs) related to cloud computing, big data, and security protocols. It covers various topics such as resource scheduling, cloud service models, cryptography, and mobile cloud computing. Additionally, it discusses characteristics of big data, cloud reliability factors, and administrative rights of cloud consumers.

Uploaded by

Muhammad Ahmed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
280 views14 pages

Cs435 Final Term Files

The document contains a compilation of important multiple-choice questions (MCQs) related to cloud computing, big data, and security protocols. It covers various topics such as resource scheduling, cloud service models, cryptography, and mobile cloud computing. Additionally, it discusses characteristics of big data, cloud reliability factors, and administrative rights of cloud consumers.

Uploaded by

Muhammad Ahmed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

CS435 SUBJECTIVE + OBJECTIVE FILES FINALL TERM

116 288.
Important MCQS
1. MCQ: MTBF stand for______________.

Correct Answers mean time between failure

2. MCQ: CSP stand for_______________.

Correct Answers Cloud Service Provider

3. MCQ: SSL stand for _____________.

Correct Answers Secure Socket Layer

4. MCQ: CIS stand for_____________.

Correct Answers Cloud Information Service

5. MCQ: The __________is called Cloudlet.

Correct Answers workload unit

6. MCQ : The characteristics of big data can be represented by ________.

Correct Answers 4vs:

7. MCQ: _______________consideration is applied to ensure SLA is not violated.

Correct Answers QoS

8. MCQ: _____________ scheduling, the task starvation can be avoided.

Correct Answers: Priority-Based

9. MCQ: SLA violation when IT resources are__________.

Correct Answers: overloaded

10. MCQ: Effective resource scheduling reduces______.

Correct Answers: Execution time

11. MCQ : The best option is to move the data center to ______.

Correct Answers: Cloud

12. MCQ: It is a third party process of finding the appropriate Cloud provider.

Correct Answers: : Cloud Brokerage


13. MCQ: The _______________clustering creates a high-availability cluster across multiple
physical servers.

Correct Answers: Hypervisor

14. MCQ: VMs hosted on a physical server are managed by________.

Correct Answers: hypervisor

15. MCQ : Advantages of Mobile Cloud Computing:

Correct Answers: Extending battery lifetime

16. MCQ: ____________architecture is used for provisioning of dedicated IT resources.

Correct Answers: Resource reservation

17. MCQ: SDN stand for_________.

Correct Answers: Software Defined Networking

18. MCQ: API stand for_________.

Correct Answers: application program interface

19. ___________can be provided to an overloaded application on the recommendation and


budget of the PaaS consumer.
Correct Answers Scalability

20. The forensic analysis of _________is the responsibility of the consumer. Correct
Answers: laaS

21. The forensic analysis for ______________is the responsibility of the provider. Correct
Answers: SaaS

22. ______are usually related to quality metrics such as performance, reliability and
maintainability.

Correct Answers: Non-functional requirement


23. _______are provided by the system analyst to the designer.

Correct Answers: functional requirement

24. VM is migrated to other server for__________.


Correct Answers: Load Balance

25. WEP stand for_______.


Correct Answers: Wired Equivalent Privacy
26. WPA stand for_____________.
Correct Answers ; Wi-Fi Protected Access

27. it may cause SLA violation when IT resources are ________.

Correct Answers: overloaded

28. initial investment regarding IT resource acquiring and installations are Called ?

Correct Answers: Upfront Costs

29. STEM stand for________.

Correct Answers: Science, Technology, Engineering and Mathematics

30. CloudSim requires Sun’s________.

Correct Answers: Java 8 or newer version


31. ___________architecture is used for provisioning of dedicated IT resources. Correct Answers:
Resource reservation

32. The _________scheduling can achieve low cost and meet deadline if negotiation is successful.
Correct Answers: bargain-based

33. ___________is the process of perfecting an algorithm to make it more beneficial. Correct
Answer: Optimization

34. The Cloud computing and Mobile Cloud computing are dependent upon ________usage of IT
resources offered by Cloud.
Correct Answers: remote

35. In case of Cloud computing, the providers of IaaS and PaaS manage to provide
_________uptime through server redundancy and failover systems.
Correct Answers: 99.9%

36. Load balancer module specially in case________ scaling.


Correct Answers: Horizontal

37. Consumers should consider the use of advanced procedures for ________provided by some
providers to avoid account hijacking or identity thefts.
Correct Answers: authentications

38. _______resource scheduling prioritizes the processing deadline of the users’ requests.
Correct Answers: Time-Based Resource

39. Include the running costs of the IT resources e.g., licensing fee, electricity, insurance and labor.
Correct Answer: On-going Costs

40. Up to ________of Europeans.


Correct Answer: 70%

41. __________excludes the access privileges of terminated employees as quickly as possible to


prevent any damages.

Correct Answer: Identity as a Service (IDaaS)


42. __________is a possibility of harm or loss as a result of an activity.
Correct Answer: Risk

43. Cloud not only provides the facility of data access over the Internet.
Correct Answer: RIDA

44. The ________is configured to use all the redundant NIC. Correct Answers: virtual
switch Big data and Characteristics :

Big Data can be: Big data is a set of techniques and technologies that require new forms of
integration to uncover large hidden values from large datasets that are diverse, complex, and
of a massive scale.
The following are the three generic characteristics of big data:
➢ Data volume is huge
➢ Data may not be categorized into regular relational databases ➢ The data is
generated, captured and processed at high speed.

Security protocol name :


➢ Wired Equivalent Privacy (WEP)
➢ Wi-Fi Protected Access (WPA)
➢ Wi-Fi Protected Access 2 (WPA2)
Question: Mobile cloud computing application name?
➢ Mobile gaming
➢ Mobile banking
➢ Mobile education
➢ Mobile healthcare

A few runtime configurations can be controlled by SaaS consumers. These include:


➢ Usage cost control
➢ SLA monitoring
➢ Security related configurations
Occurrence Probability and Business continuity impact:

Write the name of BOX :

1._____________

2._____________

3._____________

4._____________

Question: Accomplishment of using speed communication links for connecting cluster it resources.
High speed communication links are used to connect the clustered IT resources for:

➢ Workload distribution
➢ Task scheduling
➢ Data sharing
➢ System synchronization

What is Cryptography?

It is a science of providing security for information. It is a science of secret communication.

The following are the five primary functions:

➢ Privacy
➢ Authentication
➢ Integrity
➢ Non-repudiation: A mechanism to prove the originality of the sender.
➢ Exchange of crypto keys which are the strings of bits used to change the format of the
data.

Effective resource scheduling reduces:

➢ Execution cost
➢ Execution time
➢ Energy consumption

Question: On which factors cost template used by providers depend?


The cost templates used by the providers depend upon:

➢ Market competition
➢ Overhead occurred during design, deployment and operations of the service
➢ Cost reduction considerations through increased sharing of IT resources

Common types of Resource Cluster Mechanism

➢ Server Cluster
➢ Database Cluster
➢ Large Dataset Clusters

Uses of remote administration console


➢ Capacity planning
➢ Provision and releasing IT resources for on-demand usage
➢ Configure and setting cloud services
➢ Managing user accounts, security credentials, authorization and access control
➢ Monitor cloud service status, usage and performance

Lack of interoperability in cloud computing (Chat GPT)


Vendor Lock-in

➢ Incompatible APIs
➢ Data format in-compatibility

VM migration across different sources:

➢ Consolidation
➢ Upgrade/Downgrade
➢ Cloud migration
➢ Disaster recovery
➢ Load balancing
➢ Cost Optimization

A Cloud service may become disruptive/unavailable/down due to:

➢ Over burden of processing load


➢ Scheduled updates

Cloud Balancing Architecture improves/increases the following features:

➢ Load balancing
➢ Performance and scalability of IT-resources
➢ Availability and reliability of IT resources

In Dynamic Failure Detection and Recovery Architecture, The resilient watchdog module
performs the following five core functions:

➢ Monitoring
➢ Identifying an event
➢ Executing the reactive routine/s
➢ Reporting

Several factors affect the Cloud reliability


➢ Network Dependence
➢ Safety-Critical Processing

Question : Write some threats in disaster recovery of cloud computing

➢ Power failure or disruption


➢ Computer Viruses
➢ Fire, Flood & Disgruntled Employees
➢ Lost Equipment & Desktop Failure
➢ Server failure & Network Failure

Dynamic Failure Detection and Recovery Architecture allows the implementation of an


automated recovery policy consisting of predefined steps and may involve actions such as:

➢ Running a script Sending a message


➢ Restarting services

Following are the steps in Bare-Metal Provisioning Architecture:

➢ Consumer connects to central software through self-service portal.


➢ The available servers are shown.
➢ The consumer choses the server and the OS to be installed.
➢ The resource management system is used to install the required chosen OS.
➢ The consumer starts using the provisioned server.

Following are the steps in Rapid Provisioning Architecture:

➢ A consumer chooses a VM package through self-service portal and submits the


provisioning request.
➢ The centralized provisioning module selects an available VM and initiates it through a
suitable template.
➢ Upon initiation, the baseline/s templates are applied.
➢ The VM is ready to use now.

[ Cloud Consumer’s Perspective ] The administrative rights of the IaaS consumer includes,
controlling of:

➢ Life cycle of VM (powering-On/Off and restarting)


➢ Cloud storage attachment
➢ Basic software installations (OS and pre-installed software)


➢ Passwords and credentials
➢ Costs

[ Cloud Consumer’s Perspective ] Typically, a PaaS consumer receives the following:

➢ Cloud emulation environment


➢ Class libraries
➢ Software libraries
➢ Frameworks
➢ Databases

[ Cloud Consumer’s Perspective ] The administrative rights of the PaaS consumer includes,
controlling of:

➢ Cloud storage device selection


➢ Choosing the tools in case of ready-made environment
➢ Deployment of automated scaling listener, load balancer and replication etc.
➢ Login management of service/s developed/deployed using PaaS instance IT-resource
usage cost

[ Cloud Consumer’s Perspective ] A few runtime configurations can be controlled by SaaS


consumers. These include:

➢ Security related configurations


➢ SLA monitoring
➢ Usage cost control

Inter-Cloud providers are of two types:

➢ With extra resources


➢ With resource shortage

Business Cost Metrics:

➢ Upfront Costs

➢ On-going Costs


Cost management can take place across the lifecycle phases of Cloud services. These phases
may include:

➢ Design & Development


➢ Deployment
➢ Service Contracting
➢ Provisioning & Decommissioning

The cost templates used by the providers depend upon:

➢ Market competition
➢ Overhead occurred during design, deployment and operations of the service
➢ Cost reduction considerations through increased sharing of IT resources

A pricing model for Cloud services can be composed of:

➢ Fixed and variable rates definitions


➢ Negotiations by consumers
➢ Cost customization possibilities
➢ Discount offerings
➢ Payment options

Two common metrics related to service measuring resiliency are as follows:

➢ Mean-Time System Recovery (MTSR) Metric


Mean-Time to Switchover (MTSO) Metric


The key terminologies of privacy are:

➢ Data subject
➢ Data processor
➢ Data controller

Trust has two types: ➢


Hard trust

➢ Soft trust

➢ Dynamic trust (short term)


➢ Persistent trust (long term)

Five primary functions of Cryptography:

➢ Privacy
➢ Integrity
➢ Authentication
➢ Non-repudiation (A mechanism to prove the originality of the sender)
➢ Exchange of crypto keys which are the strings of bits used to change the format of the
data

Remedies for Denial of Service (DoS) attacks:

➢ Contact ISP to clarify the reason of downgraded network performance


➢ ISP can help in throttling malicious traffic
➢ Using DoS detection tools

Some prominent security protocols for wireless security are:

➢ Wired Equivalent Privacy (WEP)


➢ Wi-Fi Protected Access (WPA)
➢ Wi-Fi Protected Access 2 (WPA2)

Encryption helps in countering:

➢ Insufficient authorization

https://chat.whatsapp.com/GecIrau2Nit0D4F5DjDiGM
➢ Traffic eavesdropping
➢ Malicious intermediary
➢ Overlapping trust boundaries

There are two basic types of encryption:

➢ Symmetric Encryption
➢ Asymmetric Encryption

Identity and Access Management (IAM) Consist of four main components:

➢ Authentication (verifies user identities)


➢ Authorization (grants access to specific resources based on user roles and permissions)
➢ User management (creates, updates, and deletes accounts as needed)
➢ Credential management

Several factors affect the Cloud reliability:

➢ Network Dependence
➢ Safety-Critical Processing

The system requirements are of two types:

➢ Functional (What the cloud service should do)


➢ Non functional (How well the cloud service should perform)

Cloud Solution Design Metrics:

➢ Accessibility
➢ Audit
➢ Availability
➢ Maintainability
➢ Backup

In Cloud Resource Scheduling, There are two main steps:

➢ Resource provisioning
➢ Resource scheduling

https://chat.whatsapp.com/GecIrau2Nit0D4F5DjDiGM
Effective resource scheduling reduces:

➢ Energy consumption
➢ Execution time
➢ Execution cost

Cloud Resource Scheduling Fulfills following QoS requirements:

➢ Security
➢ Availability
➢ Reliability
➢ Scalability

Types of computational offloading:

➢ Static
➢ Dynamic

Generic characteristics of big data:

➢ Data volume is huge


➢ The data is generated, captured and processed at high speed.
➢ Data may not be categorized into regular relational databases

The characteristics of big data can be represented by 4vs:

➢ Value
➢ Volume
➢ Velocity
➢ Variety

popular models for big data:

➢ Distributed Map Reduce model (popularized by Hadoop)


➢ NoSQL model (used for non-relational, non-tabular storage)
➢ SQL RDBMS model (for relational tabular storage of structured data)

https://chat.whatsapp.com/GecIrau2Nit0D4F5DjDiGM
Software Defined Networking (SDN) has four characteristics:

➢ Standardized APIs
➢ Centralization of control plane
➢ Programmable control plane
➢ Separation of control and data planes

Online gaming consists of four basic building blocks:

➢ Networking module
➢ Input module
➢ Rendering module
➢ Game logic module

Advantages of Mobile Cloud Computing:

➢ Extending battery lifetime


➢ Improving data storage capacity and processing power
➢ Improving reliability
➢ Additionally

https://chat.whatsapp.com/GecIrau2Nit0D4F5DjDiGM

You might also like