Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

INTERNAL TEST – II – Answer Key

SubName / Code: Cloud Computing /CSE811 Date: 28/03/2024


Dept: Computer Science & Engineering Time: 8.50am-
10.30am
Year/ Sem/ Sec: IV/VIII/A & B Max. Marks: 50
Part-A
Answer all the Questions (10x2=20)
1. Define the term Load Balancing. List the network resources that can be load balanced.
(CO3, R)
Load balancing is the method of distributing network traffic equally across a pool
of resources that support an application. Modern applications must process millions of
users simultaneously and return the correct text, videos, images, and other data to each
user in a fast and reliable manner.
o Network interfaces & services such as DNS, FTP & HTTP.
o Processing through computer system assignment.
o Access to application instances.
o Connection through intelligent switches.
o Resources of storage.
2. What is the use of an Hypervisor? Draw Type 1 hypervisor. (CO3, R)
A hypervisor is a software that you can use to run multiple virtual machines on a
single physical machine. Every virtual machine has its own operating system and
applications. The hypervisor allocates the underlying physical computing resources such
as CPU and memory to individual virtual machines as required.

3. What is meant by Full virtualization? Draw the diagram for Full virtualization. (CO3,
R)
Full virtualization is a virtualization technique used to provide a VME that
completely simulates the underlying hardware. In this type of environment, any software
capable of execution on the physical hardware can be run in the VM, and any OS
supported by the underlying hardware can be run in each individual VM.
4. What are the steps are involved in virtual machine provisioning process? (CO3, R)
 Start the Deploy a Virtual Machine from a Template Task.
 Select a Template.
 Select the Virtual Machine Name and Folder.
 Select a Resource.
 Select a Datastore.
 Select Clone Options.
 Customize the Guest Operating System.
 Enter Additional Customization Parameters for the Guest Operating System.
5. Expand and explain FCAPS? (CO3, R)
FCAPS (fault, configuration, accounting, performance and security) is a network management
framework created by the International Organization for Standardization (ISO). The primary
objective of this network management model is to better understand the major functions of
network management systems.
6. How does access control help in attaining certain level of secured access to systems?
(CO4, R)
Secure access control uses policies that verify users are who they claim to be and ensures
appropriate control access levels are granted to users. Implementing access control is a crucial
component of web application security, ensuring only the right users have the right level of
access to the right resources.
7. Define CSA. List its operational domains. (CO4, R)
The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research
into best practices for securing cloud computing and the use of cloud technologies to secure
other forms of computing.
8. Draw a neat diagram for CSA reference model. (CO4, R)
9. What are the uses of auditing and compliance in securing data in cloud. (CO4, R)
The main objective of a cloud security audit is to evaluate the health of your cloud
environment, including any data and applications hosted on the cloud. Other important objectives
include: Decide the information architecture: Audits help define the network, security, and
systems requirements to secure information.
10. Write a short note on DMTF cloud management standards. (CO4, R)
Technologies like cloud computing and virtualization have been embraced by enterprise
IT managers seeking to better deliver services to their customers, lower IT costs and improve
operational efficiencies.
Part-B
Answer any Three Questions (3X10=30)
11.(a)Explain in detail about Virtual machine provisioning and manageability (CO3, U)
PROVISIONING IN THE CLOUD CONTEXT
 Amazon Elastic Compute Cloud
 Infrastructure Enabling Technology
 Eucalyptus
 Eucalyptus Architecture
 VM Dynamic Management Using OpenNebula
 OpenNebula High level architecture
 Aneka
(b) Explain the various virtual machine migration services. (CO3,U)
 Migrations Techniques
 VM Migration, SLA and On-Demand Computing
 Migration of Virtual Machines to Alternate Platforms
12. Elaborate about Understanding Hypervisors (Virtual machine types, VMware vSphere,
machine imaging) in detail. (CO3, U)
 Virtual machine types
 VMware vSphere
 VMware vCompute
 Application services
 VMware vNetwork
 VMware vStorage
 Virtual Machine File System (VMFS)
 Distributed Resource Scheduler (DRS)

13. Explain in detail about Administrating Clouds with necessary diagrams. (CO4, U)
 Administration of resources
 Configuring resources
 Enforcing security
 Monitoring operations
 Optimizing performance
 Policy management
 Performing maintenance
 Provisioning of resources

You might also like