CC 2IA Prac With Ans
CC 2IA Prac With Ans
3. Multiuser Support
The system should support many users at the same time, handling tasks like managing traffic,
updating databases, and maintaining servers smoothly.
4. Scalability
As more users and data come in, the system should be able to grow easily. This includes adding
more storage, processing power, cooling systems, and energy support without big changes.
5. Reliability
The system should keep running even if something goes wrong. Features like:
• Failover (automatic switch to backup),
• Fault tolerance (resist failure), and
• Live migration (moving VMs without shutdown)
help in recovering quickly from hardware failures or disasters.
6. Low Cost
Running and using the data center should be affordable for both the company and the users.
This means cutting unnecessary expenses and using resources efficiently.
Step 7: Monitoring
The system always watches (monitors):
• Performance (is it running well?)
• Security (is anything being attacked?)
6th ANS:-
1ST ANS:-
1. Public Cloud
• What it is: Cloud services that anyone can use over the internet.
• Example companies: Google Cloud, Microsoft Azure, Amazon Web Services (AWS)
• Who owns it: A third-party company
• Used by: General public or businesses
• Example use: You store your photos on Google Drive — that’s a public cloud!
Pros: Cheap, easy to use
Cons: Less control and security
2. Private Cloud
• What it is: Cloud that is used by only one organization.
• Who owns it: The organization itself or a private vendor
• Used by: Banks, government, or large companies needing high security
• Example use: A hospital stores patient records in its own private cloud.
Pros: More security and control
Cons: Expensive to maintain
3. Community Cloud
• What it is: Cloud shared by several organizations with similar needs.
• Used by: Groups like universities, government departments, or research labs
• Example use: Different colleges using one shared cloud to store research data
Pros: Shared cost, secure for group use
Cons: Limited flexibility compared to public cloud
4. Hybrid Cloud
• What it is: A mix of public and private clouds.
• Used when: Some data is public (non-sensitive), and some is private (secure)
• Example use: A company runs its public website on a public cloud but stores customer
payment info on a private cloud
Pros: Flexible, balances cost and security
Cons: More complex to manage
10th ANS:-
six layers of cloud services, ranging from hardware, network, and collocation to infrastructure,
platform, and software applications. We already introduced the top three service layers as SaaS,
PaaS, and IaaS, respectively. The cloud platform provides PaaS, which sits on top of the IaaS
infrastructure. The top layer offers SaaS. These must be implemented on the cloud plat forms
provided. Although the three basic models are dissimilar in usage, as shown in Table 4.7, they
are built one on top of another. The implication is that one cannot launch SaaS applications with
a cloud platform. The cloud platform cannot be built if compute and storage infrastructures are
not there.
The bottom three layers are more related to physical requirements. The bottommost layer
provides Hardware as a Service (HaaS). The next layer is for interconnecting all the hardware
com ponents, and is simply called Network as a Service (NaaS). Virtual LANs fall within the
scope of NaaS. The next layer up offers Location as a Service (LaaS), which provides a
collocation service to house, power, and secure all the physical hardware and network resources.
Some authors say this layer provides Security as a Service (“SaaS”). The cloud infrastructure
layer can be further subdi vided as Data as a Service (DaaS) and Communication as a Service
(CaaS) in addition to compute and storage in IaaS.
We will examine commercial trends in cloud services in subsequent sections. Here we will
mainly cover the top three layers with some success stories of cloud computing. As shown in
Table 4.7, cloud players are divided into three classes: (1) cloud service providers and IT
administrators, (2) soft ware developers or vendors, and (3) end users or business users. These
cloud players vary in their roles under the IaaS, PaaS, and SaaS models. The table entries
distinguish the three cloud models as viewed by different players. From the software vendors’
perspective, application performance on a given cloud platform is most important. From the
providers’ perspective, cloud infrastructure performance is the primary concern. From the end
users’ perspective, the quality of services, including security, is the most important.
Module-4
1st ANS:-
Common Cloud Security Concerns (in simple words)
1. Data Breaches and Unauthorized Access
o In the cloud, many users share the same resources (called multi-tenant).
o If security is weak, hackers might access your private or sensitive
information.
2. Data Loss
o Your data is stored in big data centers.
o If something bad happens (like a cyberattack, fire, flood, or power
failure), your data could be lost.
3. Insecure Interfaces and APIs
o Cloud services talk to other apps through something called APIs (like
digital connectors).
o If these are not designed securely, hackers can use them to get in.
4. Lack of Visibility and Control
o When you use the cloud, your data is stored in a place you can't fully see
or control.
o You might not know exactly where your data is, or how it's protected.
5. Compliance and Legal Issues
o Companies must follow laws about how data is handled (like privacy
rules).
o Since cloud data can be stored in different countries, it's harder to make
sure all the rules are followed.
3rd ANS:-
What is a Privacy Impact Assessment (PIA) in Cloud?
A PIA is like a safety check for your personal data when you're using the cloud.
It helps organizations find out if there are any privacy risks, and what to do to protect
the data.
4th ANS:-
What is DBaaS (Database-as-a-Service)?
It means companies use databases from cloud providers like Amazon RDS, Google
Cloud SQL, or MongoDB Atlas, instead of managing their own database servers.
Benefits: Easy to use, flexible, scalable, and saves money.
But... it also comes with security risks!