Professional Documents
Culture Documents
Ccs335 - Cloud Computing Schema
Ccs335 - Cloud Computing Schema
PART-A
1.Data security and privacy, Cost management, Multi cloud environment, Inter-operability and
flexibility, High dependence on network
2.In a private cloud, a single organization controls and maintains the underlying infrastructure to
deliver the IT resources. In a public cloud, external cloud providers deliver the resources as a
fully managed service.
3. A hypervisor is a software that you can use to run multiple virtual machines on a single
physical machine.
4. A hypervisor is a software that you can use to run multiple virtual machines on a single
physical machine.
5. Reduce network provisioning time from weeks to minutes.
Achieve greater operational efficiency by automating manual processes.
Place and move workloads independently of physical topology.
Improve network security within the data center.
6. Docker is an operating system for containers. Similar to how a virtual machine virtualizes
(removes the need to directly manage) server hardware, containers virtualize the operating
system of a server.
7. Amazon Web Services offers a broad set of global cloud-based products including compute,
storage, databases, analytics, networking, mobile, developer tools, management tools, IoT,
security, and enterprise applications: on-demand, available in seconds, with pay-as-you-go
pricing.
8. The pros of OpenStack include the flexibility and in-house modular control it provides anyone
who wants to set up their own cloud. This can enhance security, reliability, and scalability.
9. Hyperjacking is an attack in which a hacker takes malicious control over the hypervisor that
creates the virtual environment within a virtual machine (VM) host.
10. Excessive Permissions,Misconfigurations,Compliance/ Audit Challenges,Privilege
Escalation,Multicloud Risks,Insider Threats And Privilege Abuse,Poor Access Management
Policies And Practices,Data Access Risks.
PART-B
11.A. Peer to peer network definition -2 marks
NIST expansion and actors -2 marks
Architecture -4 marks
Components explanation -5 marks
12.A.Virtualization levels are instruction set architecture (ISA) level, hardware level, operating
system level, library support level, and application level -3marks
Architecture of virtualization layers-4 marks
Layers explanation with example -6 marks
PART-C
16 A. Taxonomy of virtual machines
Diagram with explanation – 7 marks
Steps for launching a virtual server in AWS cloud platform – 8 marks