0% found this document useful (0 votes)
2 views

Cloud_Computing_2_Mark_Answers

Cloud computing

Uploaded by

Preeti Ramesh
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Cloud_Computing_2_Mark_Answers

Cloud computing

Uploaded by

Preeti Ramesh
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Answers to 2-Mark Questions

Tabulate the Design challenges of cloud computing:


- Security and Privacy: Protecting data and preventing breaches.
- Scalability: Maintaining performance with increasing users.
- Performance Monitoring: Ensuring uptime and resource optimization.
- Interoperability: Integrating with existing systems seamlessly.

Distinguish between Public and Private Clouds:


- Public Cloud: Accessible by multiple users; resources owned by a third party.
- Private Cloud: Dedicated infrastructure for a single organization; more control.

What is the hypervisor?


A hypervisor, also known as a virtual machine monitor (VMM), is software that creates and
manages virtual machines by abstracting hardware resources.

Write the role of CPU Virtualization:


CPU virtualization allows multiple operating systems to share the same physical CPU by
running isolated virtual machines.

What are the benefits of Network Virtualization?


- Improved network performance and scalability.
- Simplified management and monitoring.
- Better utilization of resources.

What is a Docker in Cloud Computing?


Docker is a containerization platform that packages applications with dependencies into
containers, enabling portability and consistency across environments.

Summarize the service offerings by AWS:


- Compute Services: EC2, Lambda.
- Storage Services: S3, EBS.
- Networking Services: VPC, Route 53.
- Database Services: RDS, DynamoDB.

Depict the benefits of OpenStack Compute:


- Open-source flexibility.
- Scalability for managing large workloads.
- Enhanced support for virtualization.
What is hyperjacking?
Hyperjacking is a cyberattack where the attacker takes control of the hypervisor to gain
access to all virtual machines running on it.

List out the IAM challenges:


- Managing access to multiple cloud services.
- Ensuring compliance with regulations.
- Preventing unauthorized access.
- Balancing security with ease of use.

List any four design challenges in Cloud Computing:


- Security: Ensuring data integrity and confidentiality.
- Latency: Reducing delays in accessing resources.
- Data Management: Handling large-scale data efficiently.
- Cost Management: Balancing resource usage with expenses.

What is Cloud in Cloud Computing?


A 'cloud' refers to a network of remote servers that provide on-demand computing services
such as storage, processing, and applications over the internet.

Identify the role of Hypervisor in Virtualization:


The hypervisor manages and allocates physical hardware resources to multiple virtual
machines, enabling them to operate independently on the same hardware.

What is Hardware Virtualization?


Hardware virtualization is the abstraction of physical hardware to allow multiple operating
systems to run on the same hardware simultaneously.

How is OS Virtualization implemented?


OS virtualization is implemented by using a host operating system to create isolated
environments (containers) where multiple applications can run securely and
independently.

Differentiate between Containers and Virtual Machines and write one use case
for each:
- Containers: Lightweight; share the host OS kernel.
Use Case: Microservices deployment.
- Virtual Machines: Fully isolated; include a guest OS.
Use Case: Running legacy applications.

What do you mean by Open Cloud Ecosystem?


An open cloud ecosystem consists of interoperable cloud services and platforms built using
open-source technologies, allowing seamless integration and flexibility.
Write the procedure to deploy the application in Google App Engine:
- Develop the application locally.
- Configure the app.yaml file.
- Deploy the app using the Google Cloud SDK (gcloud app deploy).
- Monitor the deployment via Google Cloud Console.

What is Hyperjacking Attack?


A hyperjacking attack is a security breach where attackers take control of the hypervisor to
manipulate or access virtual machines running on it.

What is IAM in Cloud? What are the challenges in IAM?


- IAM (Identity and Access Management): A framework for managing user identities and
their access to cloud resources.
- Challenges:
- Managing user roles across multiple platforms.
- Preventing unauthorized access.
- Ensuring compliance with regulations.

You might also like