[go: up one dir, main page]

0% found this document useful (0 votes)
10 views3 pages

Cloud Computing Answers

The document discusses various aspects of virtualization, cloud computing, and security, detailing types of hypervisors, virtual clustering, and applications of virtualization. It also covers cloud services like AWS, Google App Engine, and security measures including the CIA triad and risks associated with cloud computing. Additionally, it highlights mobile cloud computing, containerization with Docker, and energy-aware cloud computing.

Uploaded by

homedesktop9922
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views3 pages

Cloud Computing Answers

The document discusses various aspects of virtualization, cloud computing, and security, detailing types of hypervisors, virtual clustering, and applications of virtualization. It also covers cloud services like AWS, Google App Engine, and security measures including the CIA triad and risks associated with cloud computing. Additionally, it highlights mobile cloud computing, containerization with Docker, and energy-aware cloud computing.

Uploaded by

homedesktop9922
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Q1 a) Virtualization is the creation of a virtual version of something, such as an operating system,

server, storage device, or network resources. Type 1 Hypervisors (bare-metal) run directly on the

hardware. Examples include VMware ESXi and Microsoft Hyper-V. Type 2 Hypervisors (hosted) run

on a host OS. Examples include VirtualBox and VMware Workstation.

Q1 b) Virtual clustering involves creating a cluster of virtual machines (VMs) that work together as a

single system. It enhances availability, scalability, and reliability. Load balancing and failover

mechanisms ensure seamless operation even when one VM fails.

Q1 c) In cloud computing, virtualization abstracts physical hardware to allow multiple virtual

environments. It enhances resource utilization, reduces costs, and improves scalability.

Q2 a) Applications of virtualization include server consolidation, development/testing, and disaster

recovery. Pitfalls include performance overhead, complexity, and potential security issues.

Q2 b) Network virtualization abstracts network resources to create logical networks. Storage

virtualization pools physical storage from multiple devices into a single resource. Both improve

efficiency and manageability.

Q2 c) Virtual machine migration is moving a VM from one host to another. Live migration occurs

without downtime, typically used for load balancing and maintenance.

Q3 a) AWS (Amazon Web Services) is a cloud platform offering services like EC2 (compute), S3

(storage), RDS (database), and Lambda (serverless computing).

Q3 b) Amazon S3 (Simple Storage Service) offers scalable storage for data backup and archiving.

EC2 (Elastic Compute Cloud) provides resizable compute capacity in the cloud.
Q3 c) SQL Azure is a cloud-based relational database by Microsoft, offering high availability,

scalability, and built-in intelligence for performance tuning.

Q4 a) Google App Engine is a PaaS for developing and hosting web applications. Installation steps

include signing up for GCP, creating a project, installing SDK, writing app.yaml, deploying via

gcloud.

Q4 b) Amazon Dynamo is a NoSQL database service with a distributed architecture. It uses

partitions and replicas to ensure availability and scalability.

Q4 c) Dynamo DB is a NoSQL database with low-latency data access. Amazon S3 is an object

storage service. DynamoDB is for structured data; S3 is for unstructured data.

Q5 a) Confidentiality ensures data privacy, Integrity ensures data accuracy, and Availability ensures

reliable access to data. Together, they form the CIA triad of cloud security.

Q5 b) Types of risks include data breaches, insecure APIs, account hijacking, data loss, and service

traffic hijacking.

Q5 c) Secure cloud software testing involves vulnerability assessment, penetration testing, code

analysis, and compliance checks.

Q6 a) Cloud security services include Identity and Access Management (IAM), encryption, firewall,

intrusion detection/prevention, and compliance auditing.

Q6 b) Content level security ensures only authorized access to content using methods like DRM,

watermarking, and encryption.


Q6 c) Server-side encryption secures data at rest on servers, while client-side encryption encrypts

data before uploading. Client-side offers more control to users.

Q7 a) Mobile cloud computing allows mobile devices to leverage cloud resources, enhancing

storage, processing, and battery life. It enables real-time data sync and collaboration.

Q7 b) Docker is a containerization platform. Its architecture includes Docker Engine, Docker Images,

Containers, and Docker Hub. It isolates applications for consistency and scalability.

Q7 c) IoT and cloud in smart homes allow automation, remote monitoring, and control via cloud

platforms. Data from devices is stored, processed, and analyzed in the cloud.

Q8 a) Energy-aware cloud computing optimizes energy use through techniques like VM

consolidation, power-efficient hardware, and scheduling algorithms.

Q8 b) Containers package applications with dependencies. Kubernetes manages containerized

apps at scale using pods, nodes, and clusters.

Q8 c) Distributed cloud computing spreads cloud services across multiple geographic locations to

reduce latency, enhance compliance, and improve performance.

You might also like