The document outlines the examination structure for a Cloud Security course, including various questions that cover topics such as security challenges in distributed systems, virtualization, user authentication, and cloud interoperability. It consists of multiple sections where students must answer a selection of questions related to cloud computing concepts, deployment models, and architectural considerations. The exam is designed for 4th-year B.Tech students in Computer Science & Engineering and spans a duration of 3 hours with a total of 100 marks.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
5 views2 pages
Paper 1
The document outlines the examination structure for a Cloud Security course, including various questions that cover topics such as security challenges in distributed systems, virtualization, user authentication, and cloud interoperability. It consists of multiple sections where students must answer a selection of questions related to cloud computing concepts, deployment models, and architectural considerations. The exam is designed for 4th-year B.Tech students in Computer Science & Engineering and spans a duration of 3 hours with a total of 100 marks.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2
Sub Code: BCST803D ROLL NO……………..……………..
EVEN SEMESTER EXAMINATION, 2023 – 24
th 4 Year B. Tech – Computer Science & Engineering CLOUD SECURITY
Duration: 3:00 hrs Max Marks: 100
Note: - Attempt all questions. All Questions carry equal marks. In case of any ambiguity or missing data, the same may be assumed and state the assumption made in the answer.
Q 1. Answer any four parts of the following. 5x4=20
a) Identify and discuss three major security challenges faced by distributed systems. How can these challenges be mitigated? b) Define virtualization and describe different types of virtualizations. c) Explain the importance of user authentication in SaaS applications. Discuss common authentication methods, and their implementation. d) Discuss the fault tolerance mechanisms available in virtualized data centers (VDC). e) Discuss the concept of Hadoop as a Service (HaaS) and its advantages. Explain how cloud providers offer managed Hadoop services. f) Explain the concept of cloud interoperability and why it is important for seamless integration of cloud services across different platforms. Q 2. Answer any four parts of the following. 5x4=20 a) Compare and contrast the deployment models in cloud computing. Discuss the advantages and disadvantages. b) Outline the benefits of storage virtualization in a virtualized data center. c) Explain the concept of Platform as a Service (PaaS) and its significance in cloud computing. d) Discuss the importance of implementing robust access control mechanisms and identity management systems to ensure data security and regulatory compliance in cloud environments. e) Provide a real-world example of how MapReduce is used to solve a data processing problem. f) How does Service-Oriented Architecture (SOA) relate to cloud computing, and what are the architectural influences of SOA on cloud design? Q 3. Answer any two parts of the following. 10x2= 20 a) Explain the concept of cloud architecture, including its layers, components, and design principles. b) Analyze the benefits of virtualized networking. Discuss how virtual networking components enable flexible network provisioning and management. c) Explain Google App Engine. And write the advantages and disadvantages of Google App Engine. Q 4. Answer any two parts of the following. 10x2= 20 a) Analyze the Microsoft Azure PaaS offerings. Compare Azure PaaS services with Google App Engine in terms of features, scalability, and integration with other Azure services. b) Examine architectural considerations for designing secure cloud computing environments. Evaluate the role of encryption, key management, and secure communication protocols in achieving cloud security objectives. c) Explore the deployment of Hadoop in private cloud environments. Q 5. Answer any two parts of the following. 10x2= 20 a) Explore access control mechanisms and identity management strategies in cloud environments. Discuss a) Role-based access control (RBAC) b) Multi-factor authentication (MFA) c) Federated identity management. b) Provide a comprehensive overview of big data analytics, Discuss the challenges and opportunities presented by big data. c) Discuss advanced VM configuration options. Evaluate the performance implications and optimization strategies for maximizing VM efficiency.