0% found this document useful (0 votes)
24 views12 pages

ccs336 CSM Unit 2, 3 Key

The document outlines the CIA 1 Examination details for the M.A.M. School of Engineering's Btech Artificial Intelligence and Data Science program, including exam date, duration, and maximum marks. It contains various questions related to cloud computing concepts, virtualization, AWS services, and cloud service management strategies. Additionally, it discusses cloud capacity planning, deployment models, and the differences between cloud service strategy and management.

Uploaded by

ksathishkm
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views12 pages

ccs336 CSM Unit 2, 3 Key

The document outlines the CIA 1 Examination details for the M.A.M. School of Engineering's Btech Artificial Intelligence and Data Science program, including exam date, duration, and maximum marks. It contains various questions related to cloud computing concepts, virtualization, AWS services, and cloud service management strategies. Additionally, it discusses cloud capacity planning, deployment models, and the differences between cloud service strategy and management.

Uploaded by

ksathishkm
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

M.A.M.

SCHOOL OF ENGINEERING

(An Autonomous Institution)


Accredited by NAAC & Approved by AICTE, New Delhi
Affiliated to Anna University, Chennai
Siruganur, Trichy -621 105. www.mamse.in
Department of Btech Artificial Intelligence and Data Science
Academic Year 2024-2025 (Even Semester) Unit - II

CIA 1 Examination
Sub.Code/Sub.Name : CCS336 CSM Date : 17.03.25
Year/Sem. : III / VI Duration : 3 Hrs
Max.Marks : 100

PART A M.A CO BTL

1. What is IAM in cloud? What are challenges in IAM? 2 CO2 BTL1


Identity and access management is a set of technologies that manage user
identities and allow companies to control access to critical resources. The rise of
remote working and SaaS tools make cloud-native IAM a popular option to secure
networks. IAM solutions have various components.

2. Identify the role of Hypervisor in virtualization. 2 CO2 BTL1


Hypervisors support the creation and management of virtual machines (VMs) by
abstracting a computer's software from its hardware. Hypervisors make
virtualization possible by translating requests between the physical and virtual
resources.
3. What is cloud in cloud computing? 2 CO2 BTL1
A network of remote servers, data centers, and software applications
accessible over the internet, allowing users to store, access, and manage
data and resources without needing to manage physical infrastructure.
4. Define Eucalyptus. 2 CO2 BTL1
Eucalyptus CLIs can handle Amazon Web Services and their own private
instances. Clients have the independence to transfer cases from Eucalyptus to
Amazon Elastic Cloud. The virtualization layer oversees the Network, storage,
and Computing. Occurrences are isolated by hardware virtualization.

5. Write role CPU virtuazation. 2 CO2 BTL1


Central processing unit (CPU) virtualization is the fundamental technology that
makes hypervisors, virtual machines, and operating systems possible. It allows a
single CPU to be divided into multiple virtual CPUs for use by multiple VMs.
6. Summarize service offering by AWS. 2 CO2 BTL3
AWS offers a vast array of cloud-based services, including compute, storage,
databases, analytics, networking, security, and more, enabling organizations to
move faster, lower IT costs, and scale their operations.
7. What is Docker in cloud computing? 2 CO2 BTL1
Docker is an open-source platform that enables developers to build, deploy, run,
update and manage containers. Containers are standardized, executable
components that combine application source code with the operating system
(OS) libraries and dependencies required to run that code in any environment.
8. Distingguish between private public and hybrid cloud 2 CO2 BTL1
9. What is the cloud service model risk matrix? 2 CO2 BTL3
A cloud computing risk assessment matrix is a guide that
business IT leaders can use to score their cloud computing
security needs. A number of different matrices are available
from accredited groups to help MSPs and businesses accomplish
this task.
10. Write a note on Benchmarking of cloud service? 2 CO2 BTL1
Benchmarking is a systematic process of evaluating the performance
and value of cloud services using efficiency metrics, either within an
organization or against industry peers.
11a. Illustrate in detail about cloud strategy management Framework and functionalities with
neat diagram.
12a. Explain in detail about the cloud service capacity planning strategies with relevant
examples.

Cloud capacity planning for your startup can sometimes feel like steering a sailboat onto shore
without a lighthouse. There can be lots of uncertainty and guesswork that undermine your confidence.
Fortunately, with the right strategies, you can transform this journey from a daunting task into a
structured roadmap.

Whether you’re a budding startup or an established enterprise, the key to cloud capacity planning lies
in adopting tactical best practices.

Below, we’ll walk you through tried-and-true strategies that demystify cloud capacity planning and
empower you to unlock the full potential of your cloud resources.

1. Regularly review and adjust plans


Cloud environments are dynamic, and your capacity plans need to be, too. Regularly reviewing your
current usage against your forecasts will help you identify trends and make necessary adjustments.

Set up monthly or quarterly review sessions to assess and recalibrate your capacity plans based on
actual usage data.

2. Embrace automation and auto-scaling


Modern cloud platforms offer auto-scaling features that automatically adjust resources based on
demand. This prevents your performance from dropping when there’s a spike in traffic or user
demands.

For example, Autoscaling dynamically adjusts your computing resources based on the current
workload. This helps you meet demands without overpaying for what you don’t need.

3. Invest in monitoring and analytics tools


Without data and analysis, you’re just guessing at your startup’s cloud demands. Real-time
monitoring provides insights into resource utilization, helping in proactive adjustments—AKA
making changes before something goes wrong.
13a. Explain in detail about different deployment models?
Refer unit 1 – 12aii
14a. Explain detail about cloud service Architecture? With neat diagram.
Refer unit 1 – 13ai
15a. Explain about demand Queuing Strategy with relevant examples
Unit - III

Department of Artificial Intelligence and Data Science


Academic Year 2024-2025 (Even Semester)
CIA 1 Examination
Sub.Code/Sub.Name : CCS336csm Date : 17.03.25
Year/Sem. : III / VI Duration : 3 Hrs
Max.Marks : 100

PART A M.A CO BTL

1. What is FREEmium model for cloud service management? 2 CO3 BTL1


The freemium model offers a basic or limited version of a service for free, with
premium features and functionalities available for a subscription fee, aiming to
attract a large user base and convert a portion into paying customers.
2. Discuss the scalability in cloud service management? 2 CO3 BTL1
Refers to the ability of a cloud environment to dynamically adjust
resources (like compute, storage, and network) up or down to meet
changing workload demands, enabling businesses to efficiently manage
costs and optimize performance.
3. What is the meaning of cloud orchestration and significance in cloud service 2 CO3 BTL1
management?
Cloud orchestration automates the management of complex cloud
environments by coordinating tools, applications, and infrastructure
into seamless workflows, improving efficiency and simplifying cloud
service management.
4. What are design challenges of data security in cloud service management? 2 CO3 BTL1

It ensuring data visibility, managing storage, transmission, and


processing, implementing robust access controls, and addressing insider
threats and compliance requirements.
5. Explain the concept of diaster recovery in csm? 2 CO3 BTL1
The ability to restore and maintain critical IT systems and data in the event of a
cyberattack or other disruptive event, ensuring business continuity and minimizing
downtime
6. Define cloud service portfolio. 2 C03 BT1
a collection of cloud-based IT applications and resources, hosted by
third-party providers and delivered on-demand through the internet,
encompassing various services like infrastructure, platforms, and
software.
11a. Explain cloud policy for key driver for adoption technique?
12a. What are risk strategy for organization

13a. Difference between the cloud service strategy and cloud service management?
cloud service management
Cloud Service Catalog: A list of cloud services offered by a provider, detailing their features, pricing,
and availability.
Service Provisioning: The process of making cloud services available to users, including resource
allocation and configuration.
Monitoring and Management: Continuously monitoring the performance, availability, and security of
cloud services.
Scaling and Optimization: Adjusting resources and configurations to meet hanging demands and
optimize costs.
Security and Compliance: Ensuring that cloud services adhere to security best practices and regulatory
requirements.
Cost Management: Controlling and optimizing cloud service costs, including budgeting and
allocation.

cloud service strategy


Business Alignment: Ensure that your cloud strategy aligns with your organization's overall
business goals and objectives. Understand how cloud technology can support and drive your business
forward.
Cost Management: Cloud services can become costly if not properly managed. Create a cost
management plan that includes budgeting, cost tracking, and optimization strategies to control
expenses effectively.
Security and Compliance: Prioritize security and compliance requirements. Implement best practices
for data protection, access control, and compliance with industry regulations and standards. Regularly
audit and assess your cloud environment for security vulnerabilities.
Data Management: Develop a strategy for data storage, access, and backup. Consider data lifecycle
management, data encryption, and disaster recovery to ensure data integrity and availablity.
Scalability and Flexibility: Leverage the cloud's scalability and flexibility to adapt to changing
workloads. Use auto-scaling and resource provisioning to match your application needs in realtime.
Service Selection: Choose the right cloud services (IaaS, PaaS, SaaS) and providers (e.g., AWS,
Azure, Google Cloud) that best fit your requirements. Evaluate their offerings, pricing models, and
ecosystem.
Architecture Design: Create a well-architected cloud environment that considers factors like high
availability, fault tolerance, and efficient resource utilization. Follow cloud architecture
best practices.
Automation: Implement automation for provisioning, configuration management, and deployment to
enhance operational efficiency and reduce manual errors.
Monitoring and Management: Set up robust monitoring and management tools to gain insights into
your cloud environment's performance, security, and cost. Use cloud-native monitoring solutions or
third-party tools.

You might also like