0% found this document useful (0 votes)
15 views14 pages

ccs336 CSM Unit1 Key

The document outlines the CIA 1 Examination for the BTech - Artificial Intelligence and Data Science program at M.A.M. School of Engineering for the academic year 2024-2025. It includes questions on cloud service management, cloud service agreements, IT service management, cloud service strategy, and AWS cloud model, among others. The examination covers various aspects of cloud computing, including its characteristics, deployment models, and virtualization levels.

Uploaded by

ksathishkm
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views14 pages

ccs336 CSM Unit1 Key

The document outlines the CIA 1 Examination for the BTech - Artificial Intelligence and Data Science program at M.A.M. School of Engineering for the academic year 2024-2025. It includes questions on cloud service management, cloud service agreements, IT service management, cloud service strategy, and AWS cloud model, among others. The examination covers various aspects of cloud computing, including its characteristics, deployment models, and virtualization levels.

Uploaded by

ksathishkm
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

M.A.M.

SCHOOL OF ENGINEERING

(An Autonomous Institution)


Accredited by NAAC & Approved by AICTE, New Delhi
Affiliated to Anna University, Chennai
Siruganur, Trichy -621 105. www.mamse.in

Department of BTech -Artificial Intelligence and Data Science


Unit - I
Academic Year 2024-2025 (Even Semester)
CIA 1 Examination
Sub.Code/Sub.Name : CCS336 cloud service management Date :
Year/Sem. : III / VI Duration : 3 Hrs
Max.Marks : 100

Answer All the Questions M.A CO BTL


Define cloud service management.
1. The management of cloud infrastructure products and services Cloud service providers are no 2 CO1 BTL1
different to traditional IT service providers in relation to their need to provide quality, cost-
effective, secure and available IT services.
Cloud based service providers is the provision of IT infrastructure and services under a utility
or pay-per-use model.
2. What is the role of cloud service agreement level?
2 CO1 BTL1
It ensures cloud providers meet certain enterprise-level requirements and provides
customers with a clearly defined set of deliverables. It also describes financial
penalties, such as credits for service time, if the provider fails to live up to the
guaranteed terms and conditions.
What are the key component of cloud service management?
3. 2 CO1 BTL1

4. Name any two challenges for managing cloud services?


2 CO1 BTL1

5. What is the meaning of ITSM? How is work in cloud?


2 CO1 BTL1
Service management: It includes the operational aspects of the applications and
services.
Goal of IT Service Management: IT teams manage the end-to-end delivery of IT
services to customers.
Definition: It define an approach towards IT processes and service delivery,
strictly aligned with business objectives.
6. Define cloud service strategy?
2 CO1 BTL3
Strategy: It involves setting goals and priorities, determining actions to achieve the
goals, and mobilizing resources to execute the actions.

cloud environment.
7. What are key components of cloud service strategy? 2 CO1 BTL1
Business Objectives and Alignment,
Workload Assessment,
Selection of suitable Deployment Models,
Security and Compliance,
Management and Governance,
Cost or financial Management,
Migration Plan ,
Vendor Selection,
Performance and Scalability
8. What are the benefits of well defined strategy in cloud service for our organization? 2 CO1 BTL1
Improved scalability, cost optimization, enhanced agility, and better operational
efficiency, ultimately aligning technology with business objectives.
9. What is meant by resource pooling? 2 CO1 BTL3
Resources: Hardware or Software (Computation, Storage or network )
- Resource Pool: A resource pool is a group of resources that can be assigned to users.
- Resource Pooling: Serving the several consumers with a shared set of material assets. (service
to the consumers simultaneously)
10. Give brief note on Digital transformation strategy? 2 CO1 BTL1
A digital transformation strategy details how an organization will use digital technologies to
continuously create new products, services, processes and engagement channels, as well as
reengineer existing ones to meet ever-evolving customer needs and market conditions.
11ai Explain the detail about the essential characteristics of cloud computing?
11aii. Discuss in detail about the different types of cloud service model?
12ai. Write down the essential characteristics of cloud eco system with examples?
12aii. Discuss about various deployment models?
13ai. Describe about cloud service Architecture with neat diagram
13aii. Mention various level of virtualization and explain the implementation in detail

1. Instruction Set Architecture Level

At the ISA level, virtualization is performed by emulating a given ISA by the ISA of the host machine. For
example, MIPS binary code can run on an x86-based host machine with the help of ISA emulation. With this
approach, it is possible to run a large amount of legacy binary code writ-ten for various processors on any given
new hardware host machine. Instruction set emulation leads to virtual ISAs created on any hardware machine.

2. Hardware Abstraction Level

Hardware-level virtualization is performed right on top of the bare hardware. On the one hand, this approach
generates a virtual hardware environment for a VM. On the other hand, the process manages the underlying
hardware through virtualization.

3. Operating System Level

This refers to an abstraction layer between traditional OS and user applications. OS-level virtualiza-tion creates
isolated containers on a single physical server and the OS instances to utilize the hard-ware and software in data
centers.

4. Library Support Level

Most applications use APIs exported by user-level libraries rather than using lengthy system calls by the OS.
Since most systems provide well-documented APIs, such an interface becomes another candidate for
virtualization.

5. User-Application Level

Virtualization at the application level virtualizes an application as a VM. On a traditional OS, an application
often runs as a process. Therefore, application-level virtualization is also known as process-level virtualization.
The most popular approach is to deploy high level language (HLL)
14ai. Write neat diagram, illustrate for cloud service life cycle functionalities
14aii. Draw and explain the NIST deployment model
Refer 12aii

Explain in detail about AWS cloud model in the following Aspects with application.
i. pay as you pay go prizing model
ii. security and compliance
iii. Premium
iv. Pay per user/registration
v. Diverse services.

Definition of the AWS Cloud. AWS Amazon Web Services (AWS) is a secure cloud services
platform, offering compute power, database storage, content delivery and other functionality to help
businesses scale and grow. Millions of customers are currently leveraging AWS cloud products and
solutions to build sophisticated applications with increased flexibility, scalability and reliability. The
AWS Cloud provides a broad set of infrastructure services (over 200 services are available), such as
computing power, storage options, networking and databases, delivered as a utility: on-demand,
available in seconds, with pay-as-you-go pricing.
With the AWS Cloud, capabilities for controlling, auditing and managing identity, configuration and
usage come built into the platform helping you meet your compliance governance and regulatory
requirements.

As every customer is deployed differently in AWS, customers can take advantage of shifting management
of certain IT controls to AWS which results in a (new) distributed control environment. Customers can
then use the AWS control and compliance documentation available to them to perform their control evalu-
ation and verification procedures as required. Below are examples of controls that are managed by AWS,
AWS Customers and/or both.

Inherited Controls – Controls which a customer fully inherits from AWS.

 Physical and Environmental controls

Shared Controls – Controls which apply to both the infrastructure layer and customer layers, but in com-
pletely separate contexts or perspectives. In a shared control, AWS provides the requirements for the infra-
structure and the customer must provide their own control implementation within their use of AWS ser-
vices. Examples include:

 Patch Management – AWS is responsible for patching and fixing flaws within the infrastructure, but
customers are responsible for patching their guest OS and applications.
 Configuration Management – AWS maintains the configuration of its infrastructure devices, but a custom-
er is responsible for configuring their own guest operating systems, databases, and applications.
 Awareness & Training - AWS trains AWS employees, but a customer must train their own employees.

Customer Specific – Controls which are solely the responsibility of the customer based on the application
they are deploying within AWS services. Examples include:

 Service and Communications Protection or Zone Security which may require a customer to route or zone
data within specific security environments.

The Service Terms below govern your use of the Services. Capitalized terms used in these Service Terms
but not defined below are defined in the AWS Customer Agreement or other agreement with us governing
your use of the Services (the “Agreement”). For purposes of these Service Terms, “Your Content” includes
any “Company Content” and any “Customer Content,” and “AWS Content” includes “Amazon
Properties.”

You might also like