Question Bank – 4 Modules
CSE3343 - Cloud Computing
                                     PART – A ( 2 MARKS)
1. Name the four primary stakeholders in cloud computing as defined by NIST.
2. How did utility computing influence modern cloud services?
3. What is the role of a hypervisor at the OS level?
4. List any two advantages of using virtualization in cloud computing?
5. How does automated scaling benefit cloud infrastructure?
6. Define a Service Level Agreement (SLA) in cloud computing.
7. Why is a virtual private network (VPN) used in logical network perimeter design?
8. How does Zero Trust differ from traditional perimeter-based security?
9. What is single sign-on (SSO)?
10.Mention two techniques to secure remote access in cloud environments.
11.How does utility computing relate to the pay-as-you-go model?
12.Name the four primary stakeholders in cloud computing as defined by NIST.
13.What is the difference between a Type 1 and Type 2 hypervisor?
14.State any two ways virtualization reduces IT costs.
15.What does an SLA typically define between a cloud provider and consumer?
16.What is the role of a Resource Agent in Cloud Usage Monitor?
17.When is automated scaling typically used in cloud applications?
18.In Zero Trust, what does “never trust, always verify” mean?
19.What is the role of Identity Providers (IdPs) in cloud environments?
20.Name any two-encryption technique used to secure remote access.
21.Define Cloud computing with an example.
22.Name the four primary stakeholders in cloud computing as defined by NIST
23.Difference between Type-1 and Type -2 Hypervisor
24.List any two advantages of using virtualization in cloud computing?
25.What are the four common logical units of data storage?
26.Why cloud uses audit monitor?
27.Why is a virtual private network (VPN) used in logical network perimeter design?
28.How does Zero Trust differ from traditional perimeter-based security?
29.What is single sign-on (SSO)?
30.What are recent advancements in cloud computing.
31.Why are virtualized environments so popular today?
32.Describe the historical development of cloud computing, highlighting key milestones.
33.Outline the similarities and differences between grid computing and cloud computing.
34.Write short notes on Characteristics and benefits of Cloud
35.How do cloud environments support development and testing activities?
36.Compare Infrastructure as a Service (IaaS) with Platform as a Service (PaaS). Provide
   examples.
37.List the cloud deployment models and give a detailed note about them.
38.What are the key components provided by SaaS, and how do they support virtualized
   computing resources?
39.How to develop Cloud Applications. Explain any two in detail.
40.Define virtualization and explain its significance in modern computing.
                                      PART – B ( 10 MARKS)
1. Differentiate between Public, Private, Hybrid, and Community clouds. Discuss their
      features, advantages, and scenarios where each type is best suited.
2.    Describe Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software
      as a Service (SaaS) with suitable examples. Mention their advantages and use cases.
3.    You are the HR manager at a mid-sized company that uses Zoho People for employee
      management. Each month, you need to ensure that the payroll is calculated
      accurately, including salary, deductions, overtime, and bonuses. How can you
      configure Zoho application to calculate employee payroll, including handling complex
      salary structures, tax deductions, overtime, and bonuses? Explain the steps you
      would take to ensure accurate payroll processing.
4.    You are overseeing a team of developers and designers who are working on the
      launch of a new product. The project has a strict deadline, and it's essential to ensure
      that all tasks are completed on time without compromising on quality. Use Zoho
      Creator to create a cloud application to manage and track this project. Provide the
      necessary steps to build the input form for task management.
5.    Describe the taxonomy of virtualization techniques. Compare and contrast the
      different types of virtualization techniques with respect to their benefits and
      challenges.
6.    Describe the role of hypervisors in virtualization and differentiate between Type 1
      and Type 2 hypervisors.
7.    You are tasked with setting up a virtual machine on your system for ethical hacking
      purposes. You decide to use VirtualBox and install Kali Linux on the virtual machine.
      Describe the steps you would take to set up a virtual machine using VirtualBox and
      install Kali Linux on it, ensuring that the environment is ready for penetration testing
      activities.
8.    A development team wants to use Ubuntu as their main operating system for coding
      and testing software applications. They require an environment with all the
      necessary development tools, libraries, and dependencies. Walk through the process
      of installing Ubuntu and configuring it for development purposes. Include installing
      programming languages (like Python, Java, or Node.js), code editors, and version
      control tools
9.    List and explain the key components involved in creating a logical network perimeter.
      How do each of these components contribute to securing a network?
10.   Explain the concept of a Cloud Usage Monitor. What role does it play in managing
      cloud resources and optimizing cloud environments?
11.   You are tasked with designing a cloud infrastructure to support an e-commerce
      platform with users across North America and Europe. Using Cloud Analyst, explain
      the step-by-step procedure to configure user bases and data centers in order to
      ensure low response time and high availability of services.
12. Your organization is planning to migrate services to the cloud. Using Cloud Analyst,
      describe the step-by-step process to simulate the deployment of two data centers and
      three user bases. Based on the simulation results, how would you estimate the
      operational cost, and what configuration changes could you make to reduce the
      overall cost?
13.   Describe the importance of identity management in cloud environments. How does it
      ensure secure access and user authentication?
14.   Explain Privileged Access Management (PAM) in cloud security. How does PAM help
      in mitigating insider threats and enforcing security policies?
15.   You are working as a data engineer for a company that collects massive logs from
      their web application. These logs need to be analyzed for user behavior and error
      detection.
      Using Hadoop, describe the step-by-step process of how you would collect, store, and
      analyze these logs using MapReduce.
16.   Your retail company handles terabytes of sales data daily from multiple branches.
      Management wants to analyze customer buying patterns and product trends in real-
      time to improve decision-making and marketing strategies. Explain the step-by-step
      process to design a Hadoop-based solution for this scenario. Mention the Hadoop
      components you would use, and describe how the data would be collected, stored,
      processed, and analyzed to generate useful insights.
17.   Explain the deployment models and their impact on the security, compliance, and
      flexibility of the cloud infrastructure.
18.   Compare IaaS, PaaS, and SaaS with respect to control, flexibility, and management
      responsibilities. Explain which service model would be ideal for small businesses and
      which for enterprise-level applications, justifying your reasoning.
19. Your company conducts annual performance appraisals for employees. Using Zoho People,
    you need to create an efficient appraisal process. How would you configure Zoho People to
    facilitate the performance appraisal process? Explain the steps for creating employee self-
    assessment and manager review workflows.
20. You are responsible for managing the inventory of a retail store that carries a large
      number of products. To efficiently track stock levels and manage orders in real-time,
      you decide to develop an inventory management application using Zoho Creator.
      Describe the step-by-step process of creating a Product Catalog form to manage
      product details, including product name, SKU, price, and stock quantity.
21.   Illustrate the taxonomy of virtualization in cloud computing. Discuss how each
      technique helps in achieving scalability and isolation.
22.   Describe the major types of virtualization techniques and compare them based on
      performance, isolation, and resource utilization.
23.   You are a cybersecurity student preparing for penetration testing labs. You want a
      secure and isolated environment to practice tools like Nmap, Wireshark, and
      Metasploit. Describe the step-by-step process of creating a VirtualBox VM and
      installing Kali Linux with proper network and storage settings.
24.   Your organization has adopted open-source tools for software development. As the
      team lead, you're responsible for setting up a Linux-based development environment
      using Ubuntu. Describe the steps to install Ubuntu and configure it with essential
      development tools, including Python, Git, VS Code, and Docker.
25. Describe the concept of a ready-made environment in cloud computing. Explain how
      it benefits developers and organizations in accelerating deployment and reducing
      setup complexities. Provide suitable examples.
26.   Explain how Automated Scaling Listeners support cost optimization and service
      continuity in multi-cloud deployments. Provide detailed examples of its application in
      real-time cloud services.
27.   You are a cloud consultant for a healthcare company planning to deploy a cloud-
      based patient portal accessible from multiple global locations. Using Cloud Analyst,
      describe step-by-step how you would configure multiple data centers and user bases
      to simulate and evaluate system performance.
28.   A fintech company wants to expand its services to the Middle East and Africa. They
      seek high availability and minimal network latency. Using Cloud Analyst, outline the
      steps to model this scenario, including data center placement, load balancing policy,
      and cost analysis.
29.   What is Privileged Access Management (PAM)? Explain the best practices for
      implementing PAM in cloud environments, including risk mitigation strategies.
30.   Explain the Zero Trust Security Model in detail. How does it differ from traditional
      perimeter-based models, and what are its implications for cloud infrastructure
      security?
31.   You are tasked with processing large sets of IoT sensor data collected across multiple
      factories. The data is in raw log format and needs to be cleaned, transformed, and
      analyzed for patterns such as machine failures or performance issues. Using Hadoop,
      explain the step-by-step process of how you would store, process, and analyze this
      data using MapReduce.
32.   Your company operates a large retail network with multiple stores, each storing
      information on product inventory, sales, and customer orders. The data generated is
      in real-time and spans thousands of transactions daily. You need to set up a data
      pipeline to analyze inventory levels, sales trends, and customer preferences across all
      branches. Explain how you would design a Hadoop-based solution to manage and
      analyze inventory and sales data from multiple retail branches.
33.   Describe the cloud deployment models and give a detailed note about them.
34.   Describe Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as
      a Service (SaaS) with suitable examples. Mention their advantages and use cases.
35.   Zoho is an Indian multinational technology company that provides a suite of cloud-based
      software applications for businesses. What are the steps to create an Cab Booking
      application in Zoho Creator?
36.   You are responsible for managing the inventory of a retail store that carries a large number
      of products. To efficiently track stock levels and manage orders in real-time, you decide to
      develop an inventory management application using Zoho Creator. Describe the step-by-
      step process of creating a Product Catalog form to manage product details, including
      product name, SKU, price, and stock quantity.
37.   Elaborate each level of virtualization which are implemented in Cloud Computing with
      neat diagram.
38.   A small business is considering adopting virtualization to optimize its IT infrastructure.
      Illustrate all the types of virtualizations that could benefit the business, and explain how
      each type would improve efficiency.
39. Define virtualization and explain the process of installing Ubuntu on a virtual machine
    using VirtualBox or VMware
40. What is the role of a hypervisor in virtualization and explain the steps to install Kali Linux
    on a virtual machine using VirtualBox or VMware.
41. Your company has migrated critical applications to a cloud provider's platform. However,
    you've noticed performance degradation during peak usage hours, impacting user
    experience. How would you address this performance issue with the cloud provider based
    on the SLA? What metrics or performance targets outlined in the SLA would you
    reference, and what steps would you take to ensure compliance with the agreed-upon
    service levels?
42. Anusha migrated her infrastructure to the cloud to take advantage of her scalability and
    flexibility. However, she had noticed a significant increase in cloud spending, and she
    want to ensure that resources are being utilized efficiently and costs are optimized. How
    would she implement a pay-per-use monitor to track and optimize cloud spending?
43. You are tasked with designing a cloud infrastructure to support an e-commerce platform
    with users across North America and Europe. Using Cloud Analyst, explain the step-by-
    step procedure to configure user bases and data centers in order to ensure low response
    time and high availability of services.
44. Write a Java Program for creating a basic virtual machine (VM) class, allocating resources
    (like CPU, memory), and running a simple web application example as a simulation.
45. Describe the importance of identity management in cloud environments. How does it
    ensure secure access and user authentication?
46. Anusha who had startup to analyse videos. She needs a lot of storage as videos consume
    quite a bit of disk. Additionally, she discovered some very good tools to facilitate
    development in Windows but the deployment will be more efficiently handled in the Linux
    environment. Help her how to move her videos in docker and container in detail.
47. How would you use the MapReduce programming model to process and analyse the large
    dataset efficiently in a distributed computing environment and describe two primary tasks
    involved in MapReduce and also give example with Word Count problem.
48. You’ve just joined a new project that involves deploying Python web applications to
    Google Cloud. As a first step, you’ve been asked to set up the development environment
    and deploy a simple 'Hello, World!' app using Google App Engine. How would you go
    about installing Google App Engine and creating this initial Python application?"
49. A small business is considering adopting virtualization to optimize its IT infrastructure.
    Illustrate all the types of virtualization that could benefit the business, and explain how
    each type would improve efficiency.
50. A data center is planning to implement virtualization. Compare the advantages and
    disadvantages of full virtualization and para-virtualization, and recommend which
    approach might be more suitable for the data center's needs.
51. Describe in detail on Taxonomy of Virtualization with neat diagram.
52. Explain the techniques which comes under Process Level and System Level.
53. Elaborate each levels of virtualization which are implemented in Cloud Computing with
    neat diagram.
54. How does a logical network perimeter contribute to the security of cloud environments?
55. What are the advantages of using virtual servers in a cloud infrastructure compared to
    physical servers?
56. How does data replication and redundancy contribute to the reliability of cloud storage
    devices?
57. Mention the steps involved in MapReduce with diagram
58. Describe the two primary tasks involved in MapReduce.
59. List down the key features of MapReduce for large-scale data processing tasks?
60. Describe the key features of Cloud Haskell that make it suitable for big data processing.
61. What is the role of Cloud Analyst. Give some real time examples.