50% found this document useful (2 votes)
780 views

Question Bank Cloud Security

PRESIDENCY UNIVERSITY Department of Computer Science and Engineering Academic Year: 2023-24 Sem/Year: V /III Course: Cloud Security Code: CSE3095
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
50% found this document useful (2 votes)
780 views

Question Bank Cloud Security

PRESIDENCY UNIVERSITY Department of Computer Science and Engineering Academic Year: 2023-24 Sem/Year: V /III Course: Cloud Security Code: CSE3095
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

PRESIDENCY UNIVERSITY

Department of Computer Science and Engineering

Academic Year: 2023-24 Sem/Year: V /III


Course: Cloud Security Code: CSE3095
QUESTION BANK
MODULE-1
1. What is on-demand functionality? How is it provided in cloud
computing?
2. What is a community cloud ,discuss in detail the characteristics and
benefits of it.
3. What is cloud computing? What are the Characteristics and benefits of
cloud computing?
4. List any five features of cloud computing. ,
5. Name the types of cloud computing and explain.
6. Discuss in detail about types of cloud services with suitable diagram.
7. What is meant by computing environment? Describe different types of
computing environment in detail
8. Write a note on i) AWS ii) Google App Engine iii) Azure iv) Force.com
v) Salesforce.com vi) Hadoop.
9. A company wants the services of cloud for selling their products.
According to your knowledge which types of cloud services the company
need. Why it is need? Discuss.
10. List any ten applications of cloud computing.
11. Describe the major features of the Aneka Application Model with suitable
sketch.
12. Illustrate advantages and disadvantages of different types of computing
environment.
13. Differentiate between cloud computing and traditional computing.
14. Compare public cloud with private cloud.
15. Differentiate between SaaS, PaaS and IaaS with suitable example.
16. How SPI model is different from cloud delivery model? Clarify.

MODULE-2
17. Write short notes about the Computer Security Incident Response Team
(CSIRT).
18. Explain the security policy implementation.
19. Summarize different Virtualization Management Roles.
20. Explain virtualization security management in detail with a neat sketch
21. Explain the best practice security techniques for virtualized systems.
22. Describe the criteria that may be used to determine the classification of an
information object.
23. Discuss the virtualization security management with a neat diagram.
24. Explain the identity Management and Access Control in cloud security
architecture
25. Write a short note on different policy types.
26. Discuss Value of SSH .
27. Explain the special cases for the handling of sensitive or critical data.
28. Explain the components of key management in cloud security
architecture.
29. What are the details to be recorded in IT Audit logs
30. Describe the virtualization types
31. Explain virtualization security management with neat sketch
32. Outline the reason behind rogue hypervisors.
33. List different VM Threat Levels.
34. Define autonomic security? List the different autonomic computing
characteristics by IBM.
35. Explain updating and patching security techniques in VM.
36. Discuss Auditing of VM.
37. How are the Information of a organization is Classified
38. Describe the different types of cloud security management controls .
39. Explain the different types of employee termination .
40. Explain Remote Access VPN with a neat diagram.

MODULE-3
41. Differentiate between Internal and External security requirements
42. What are the basic properties that requirements should possess?
43. Define BCP/DRP. What are the alternative services during disasters
44. List out the six main attributes and 21 sub characteristics standard
characterizes software quality
45. Pick any 10 NIST 33 principles and briefly explain them.
46. What are the three primary goals of BIA
47. List and explain the basic properties that requirement should possess.
48. List out the seven principles that support information assurance and
Discuss in detail.
49. Explain in detail about the different types of testing in secure Cloud
software testing.
50. What are the four principle components of a BCP
51. List and explain with an example two types of IT auditors
52. What are the functions audited by IT auditors
53. Differentiate between internal and external security requirements
54. What are seven principles that support information assurance? Explain any
two in brief.
55. Explain in detail any two ISO 9126 software quality standard measures.
56. Explain security testing in detail.
57. What are the specific areas to be addressed by cloud provider’s w.r.t
disaster recovery?
58. 24.Explain the classification of Recovery Time Frame Requirements.
59. List and explain 3 primary goals of BIA along with 4 steps which are
generally involved in the process of BIA.
60. List out and explain in detail various Secure Development Practices
61. Abbreviate the following
a) CIA
b) ISO
c) NIST
d) DRP
e) BCP

MODULE-4
62. Discuss Network level Mitigation.
63. Write the host security threats.
64. Summarize PAAS Application security.
65. Discuss IAAS application security.
66. Describe the public cloud security Limitations.
67. Explain the different aspects of data security.
68. Summarize the types of data security(6M)
69. Define the following
a)Data Lineage b)Data Provenance c) Data Remanence d) Data
Mitigation
70. Describe the challenges of DOS and EDOS
71. Who is responsible for web application security in the cloud?.
72. Explain the types of Data Security.
73. Explain the Infrastructure Security in the Network Level
74. Discuss the Infrastructure security in the Host
75. Explain the Infrastructure security in the Application Level

You might also like