0% found this document useful (0 votes)
42 views6 pages

Question Bank - 4 Modules

The document is a comprehensive question bank for the CSE3343 Cloud Computing course, divided into two parts: Part A consists of 60 short-answer questions covering various topics in cloud computing, while Part B includes 20 detailed questions requiring explanations and step-by-step processes related to cloud services, virtualization, and application management. Key themes include cloud deployment models, service models (IaaS, PaaS, SaaS), security measures, and practical applications using tools like Zoho and Cloud Analyst. The questions aim to assess understanding of cloud computing concepts, techniques, and their implementation in real-world scenarios.

Uploaded by

sejalkuchu974
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views6 pages

Question Bank - 4 Modules

The document is a comprehensive question bank for the CSE3343 Cloud Computing course, divided into two parts: Part A consists of 60 short-answer questions covering various topics in cloud computing, while Part B includes 20 detailed questions requiring explanations and step-by-step processes related to cloud services, virtualization, and application management. Key themes include cloud deployment models, service models (IaaS, PaaS, SaaS), security measures, and practical applications using tools like Zoho and Cloud Analyst. The questions aim to assess understanding of cloud computing concepts, techniques, and their implementation in real-world scenarios.

Uploaded by

sejalkuchu974
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Question Bank – 4 Modules

CSE3343 - Cloud Computing


PART – A ( 2 MARKS)

1. Name the four primary stakeholders in cloud computing as defined by NIST.


2. How did utility computing influence modern cloud services?
3. What is the role of a hypervisor at the OS level?
4. List any two advantages of using virtualization in cloud computing?
5. How does automated scaling benefit cloud infrastructure?
6. Define a Service Level Agreement (SLA) in cloud computing.
7. Why is a virtual private network (VPN) used in logical network perimeter design?
8. How does Zero Trust differ from traditional perimeter-based security?
9. What is single sign-on (SSO)?
10.Mention two techniques to secure remote access in cloud environments.
11.How does utility computing relate to the pay-as-you-go model?
12.Name the four primary stakeholders in cloud computing as defined by NIST.
13.What is the difference between a Type 1 and Type 2 hypervisor?
14.State any two ways virtualization reduces IT costs.
15.What does an SLA typically define between a cloud provider and consumer?
16.What is the role of a Resource Agent in Cloud Usage Monitor?
17.When is automated scaling typically used in cloud applications?
18.In Zero Trust, what does “never trust, always verify” mean?
19.What is the role of Identity Providers (IdPs) in cloud environments?
20.Name any two-encryption technique used to secure remote access.
21.Define Cloud computing with an example.
22.Name the four primary stakeholders in cloud computing as defined by NIST
23.Difference between Type-1 and Type -2 Hypervisor
24.List any two advantages of using virtualization in cloud computing?
25.What are the four common logical units of data storage?
26.Why cloud uses audit monitor?
27.Why is a virtual private network (VPN) used in logical network perimeter design?
28.How does Zero Trust differ from traditional perimeter-based security?
29.What is single sign-on (SSO)?
30.What are recent advancements in cloud computing.
31.Why are virtualized environments so popular today?
32.Describe the historical development of cloud computing, highlighting key milestones.
33.Outline the similarities and differences between grid computing and cloud computing.
34.Write short notes on Characteristics and benefits of Cloud
35.How do cloud environments support development and testing activities?
36.Compare Infrastructure as a Service (IaaS) with Platform as a Service (PaaS). Provide
examples.
37.List the cloud deployment models and give a detailed note about them.
38.What are the key components provided by SaaS, and how do they support virtualized
computing resources?
39.How to develop Cloud Applications. Explain any two in detail.
40.Define virtualization and explain its significance in modern computing.

PART – B ( 10 MARKS)

1. Differentiate between Public, Private, Hybrid, and Community clouds. Discuss their
features, advantages, and scenarios where each type is best suited.
2. Describe Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software
as a Service (SaaS) with suitable examples. Mention their advantages and use cases.
3. You are the HR manager at a mid-sized company that uses Zoho People for employee
management. Each month, you need to ensure that the payroll is calculated
accurately, including salary, deductions, overtime, and bonuses. How can you
configure Zoho application to calculate employee payroll, including handling complex
salary structures, tax deductions, overtime, and bonuses? Explain the steps you
would take to ensure accurate payroll processing.
4. You are overseeing a team of developers and designers who are working on the
launch of a new product. The project has a strict deadline, and it's essential to ensure
that all tasks are completed on time without compromising on quality. Use Zoho
Creator to create a cloud application to manage and track this project. Provide the
necessary steps to build the input form for task management.
5. Describe the taxonomy of virtualization techniques. Compare and contrast the
different types of virtualization techniques with respect to their benefits and
challenges.
6. Describe the role of hypervisors in virtualization and differentiate between Type 1
and Type 2 hypervisors.
7. You are tasked with setting up a virtual machine on your system for ethical hacking
purposes. You decide to use VirtualBox and install Kali Linux on the virtual machine.
Describe the steps you would take to set up a virtual machine using VirtualBox and
install Kali Linux on it, ensuring that the environment is ready for penetration testing
activities.
8. A development team wants to use Ubuntu as their main operating system for coding
and testing software applications. They require an environment with all the
necessary development tools, libraries, and dependencies. Walk through the process
of installing Ubuntu and configuring it for development purposes. Include installing
programming languages (like Python, Java, or Node.js), code editors, and version
control tools
9. List and explain the key components involved in creating a logical network perimeter.
How do each of these components contribute to securing a network?
10. Explain the concept of a Cloud Usage Monitor. What role does it play in managing
cloud resources and optimizing cloud environments?
11. You are tasked with designing a cloud infrastructure to support an e-commerce
platform with users across North America and Europe. Using Cloud Analyst, explain
the step-by-step procedure to configure user bases and data centers in order to
ensure low response time and high availability of services.
12. Your organization is planning to migrate services to the cloud. Using Cloud Analyst,
describe the step-by-step process to simulate the deployment of two data centers and
three user bases. Based on the simulation results, how would you estimate the
operational cost, and what configuration changes could you make to reduce the
overall cost?
13. Describe the importance of identity management in cloud environments. How does it
ensure secure access and user authentication?
14. Explain Privileged Access Management (PAM) in cloud security. How does PAM help
in mitigating insider threats and enforcing security policies?
15. You are working as a data engineer for a company that collects massive logs from
their web application. These logs need to be analyzed for user behavior and error
detection.
Using Hadoop, describe the step-by-step process of how you would collect, store, and
analyze these logs using MapReduce.
16. Your retail company handles terabytes of sales data daily from multiple branches.
Management wants to analyze customer buying patterns and product trends in real-
time to improve decision-making and marketing strategies. Explain the step-by-step
process to design a Hadoop-based solution for this scenario. Mention the Hadoop
components you would use, and describe how the data would be collected, stored,
processed, and analyzed to generate useful insights.
17. Explain the deployment models and their impact on the security, compliance, and
flexibility of the cloud infrastructure.
18. Compare IaaS, PaaS, and SaaS with respect to control, flexibility, and management
responsibilities. Explain which service model would be ideal for small businesses and
which for enterprise-level applications, justifying your reasoning.
19. Your company conducts annual performance appraisals for employees. Using Zoho People,
you need to create an efficient appraisal process. How would you configure Zoho People to
facilitate the performance appraisal process? Explain the steps for creating employee self-
assessment and manager review workflows.
20. You are responsible for managing the inventory of a retail store that carries a large
number of products. To efficiently track stock levels and manage orders in real-time,
you decide to develop an inventory management application using Zoho Creator.
Describe the step-by-step process of creating a Product Catalog form to manage
product details, including product name, SKU, price, and stock quantity.
21. Illustrate the taxonomy of virtualization in cloud computing. Discuss how each
technique helps in achieving scalability and isolation.
22. Describe the major types of virtualization techniques and compare them based on
performance, isolation, and resource utilization.
23. You are a cybersecurity student preparing for penetration testing labs. You want a
secure and isolated environment to practice tools like Nmap, Wireshark, and
Metasploit. Describe the step-by-step process of creating a VirtualBox VM and
installing Kali Linux with proper network and storage settings.
24. Your organization has adopted open-source tools for software development. As the
team lead, you're responsible for setting up a Linux-based development environment
using Ubuntu. Describe the steps to install Ubuntu and configure it with essential
development tools, including Python, Git, VS Code, and Docker.
25. Describe the concept of a ready-made environment in cloud computing. Explain how
it benefits developers and organizations in accelerating deployment and reducing
setup complexities. Provide suitable examples.
26. Explain how Automated Scaling Listeners support cost optimization and service
continuity in multi-cloud deployments. Provide detailed examples of its application in
real-time cloud services.
27. You are a cloud consultant for a healthcare company planning to deploy a cloud-
based patient portal accessible from multiple global locations. Using Cloud Analyst,
describe step-by-step how you would configure multiple data centers and user bases
to simulate and evaluate system performance.
28. A fintech company wants to expand its services to the Middle East and Africa. They
seek high availability and minimal network latency. Using Cloud Analyst, outline the
steps to model this scenario, including data center placement, load balancing policy,
and cost analysis.
29. What is Privileged Access Management (PAM)? Explain the best practices for
implementing PAM in cloud environments, including risk mitigation strategies.
30. Explain the Zero Trust Security Model in detail. How does it differ from traditional
perimeter-based models, and what are its implications for cloud infrastructure
security?
31. You are tasked with processing large sets of IoT sensor data collected across multiple
factories. The data is in raw log format and needs to be cleaned, transformed, and
analyzed for patterns such as machine failures or performance issues. Using Hadoop,
explain the step-by-step process of how you would store, process, and analyze this
data using MapReduce.
32. Your company operates a large retail network with multiple stores, each storing
information on product inventory, sales, and customer orders. The data generated is
in real-time and spans thousands of transactions daily. You need to set up a data
pipeline to analyze inventory levels, sales trends, and customer preferences across all
branches. Explain how you would design a Hadoop-based solution to manage and
analyze inventory and sales data from multiple retail branches.
33. Describe the cloud deployment models and give a detailed note about them.
34. Describe Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as
a Service (SaaS) with suitable examples. Mention their advantages and use cases.
35. Zoho is an Indian multinational technology company that provides a suite of cloud-based
software applications for businesses. What are the steps to create an Cab Booking
application in Zoho Creator?
36. You are responsible for managing the inventory of a retail store that carries a large number
of products. To efficiently track stock levels and manage orders in real-time, you decide to
develop an inventory management application using Zoho Creator. Describe the step-by-
step process of creating a Product Catalog form to manage product details, including
product name, SKU, price, and stock quantity.
37. Elaborate each level of virtualization which are implemented in Cloud Computing with
neat diagram.
38. A small business is considering adopting virtualization to optimize its IT infrastructure.
Illustrate all the types of virtualizations that could benefit the business, and explain how
each type would improve efficiency.
39. Define virtualization and explain the process of installing Ubuntu on a virtual machine
using VirtualBox or VMware
40. What is the role of a hypervisor in virtualization and explain the steps to install Kali Linux
on a virtual machine using VirtualBox or VMware.
41. Your company has migrated critical applications to a cloud provider's platform. However,
you've noticed performance degradation during peak usage hours, impacting user
experience. How would you address this performance issue with the cloud provider based
on the SLA? What metrics or performance targets outlined in the SLA would you
reference, and what steps would you take to ensure compliance with the agreed-upon
service levels?
42. Anusha migrated her infrastructure to the cloud to take advantage of her scalability and
flexibility. However, she had noticed a significant increase in cloud spending, and she
want to ensure that resources are being utilized efficiently and costs are optimized. How
would she implement a pay-per-use monitor to track and optimize cloud spending?
43. You are tasked with designing a cloud infrastructure to support an e-commerce platform
with users across North America and Europe. Using Cloud Analyst, explain the step-by-
step procedure to configure user bases and data centers in order to ensure low response
time and high availability of services.
44. Write a Java Program for creating a basic virtual machine (VM) class, allocating resources
(like CPU, memory), and running a simple web application example as a simulation.
45. Describe the importance of identity management in cloud environments. How does it
ensure secure access and user authentication?
46. Anusha who had startup to analyse videos. She needs a lot of storage as videos consume
quite a bit of disk. Additionally, she discovered some very good tools to facilitate
development in Windows but the deployment will be more efficiently handled in the Linux
environment. Help her how to move her videos in docker and container in detail.
47. How would you use the MapReduce programming model to process and analyse the large
dataset efficiently in a distributed computing environment and describe two primary tasks
involved in MapReduce and also give example with Word Count problem.
48. You’ve just joined a new project that involves deploying Python web applications to
Google Cloud. As a first step, you’ve been asked to set up the development environment
and deploy a simple 'Hello, World!' app using Google App Engine. How would you go
about installing Google App Engine and creating this initial Python application?"
49. A small business is considering adopting virtualization to optimize its IT infrastructure.
Illustrate all the types of virtualization that could benefit the business, and explain how
each type would improve efficiency.
50. A data center is planning to implement virtualization. Compare the advantages and
disadvantages of full virtualization and para-virtualization, and recommend which
approach might be more suitable for the data center's needs.
51. Describe in detail on Taxonomy of Virtualization with neat diagram.
52. Explain the techniques which comes under Process Level and System Level.
53. Elaborate each levels of virtualization which are implemented in Cloud Computing with
neat diagram.
54. How does a logical network perimeter contribute to the security of cloud environments?
55. What are the advantages of using virtual servers in a cloud infrastructure compared to
physical servers?
56. How does data replication and redundancy contribute to the reliability of cloud storage
devices?
57. Mention the steps involved in MapReduce with diagram
58. Describe the two primary tasks involved in MapReduce.
59. List down the key features of MapReduce for large-scale data processing tasks?
60. Describe the key features of Cloud Haskell that make it suitable for big data processing.
61. What is the role of Cloud Analyst. Give some real time examples.

You might also like