Professional Documents
Culture Documents
CC Answer Key Int 2
CC Answer Key Int 2
3. What is meant by Full virtualization? Draw the diagram for Full virtualization. (CO3,
R)
Full virtualization is a virtualization technique used to provide a VME that
completely simulates the underlying hardware. In this type of environment, any software
capable of execution on the physical hardware can be run in the VM, and any OS
supported by the underlying hardware can be run in each individual VM.
4. What are the steps are involved in virtual machine provisioning process? (CO3, R)
Start the Deploy a Virtual Machine from a Template Task.
Select a Template.
Select the Virtual Machine Name and Folder.
Select a Resource.
Select a Datastore.
Select Clone Options.
Customize the Guest Operating System.
Enter Additional Customization Parameters for the Guest Operating System.
5. Expand and explain FCAPS? (CO3, R)
FCAPS (fault, configuration, accounting, performance and security) is a network management
framework created by the International Organization for Standardization (ISO). The primary
objective of this network management model is to better understand the major functions of
network management systems.
6. How does access control help in attaining certain level of secured access to systems?
(CO4, R)
Secure access control uses policies that verify users are who they claim to be and ensures
appropriate control access levels are granted to users. Implementing access control is a crucial
component of web application security, ensuring only the right users have the right level of
access to the right resources.
7. Define CSA. List its operational domains. (CO4, R)
The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research
into best practices for securing cloud computing and the use of cloud technologies to secure
other forms of computing.
8. Draw a neat diagram for CSA reference model. (CO4, R)
9. What are the uses of auditing and compliance in securing data in cloud. (CO4, R)
The main objective of a cloud security audit is to evaluate the health of your cloud
environment, including any data and applications hosted on the cloud. Other important objectives
include: Decide the information architecture: Audits help define the network, security, and
systems requirements to secure information.
10. Write a short note on DMTF cloud management standards. (CO4, R)
Technologies like cloud computing and virtualization have been embraced by enterprise
IT managers seeking to better deliver services to their customers, lower IT costs and improve
operational efficiencies.
Part-B
Answer any Three Questions (3X10=30)
11.(a)Explain in detail about Virtual machine provisioning and manageability (CO3, U)
PROVISIONING IN THE CLOUD CONTEXT
Amazon Elastic Compute Cloud
Infrastructure Enabling Technology
Eucalyptus
Eucalyptus Architecture
VM Dynamic Management Using OpenNebula
OpenNebula High level architecture
Aneka
(b) Explain the various virtual machine migration services. (CO3,U)
Migrations Techniques
VM Migration, SLA and On-Demand Computing
Migration of Virtual Machines to Alternate Platforms
12. Elaborate about Understanding Hypervisors (Virtual machine types, VMware vSphere,
machine imaging) in detail. (CO3, U)
Virtual machine types
VMware vSphere
VMware vCompute
Application services
VMware vNetwork
VMware vStorage
Virtual Machine File System (VMFS)
Distributed Resource Scheduler (DRS)
13. Explain in detail about Administrating Clouds with necessary diagrams. (CO4, U)
Administration of resources
Configuring resources
Enforcing security
Monitoring operations
Optimizing performance
Policy management
Performing maintenance
Provisioning of resources