HO TECHNICAL UNIVERSITY
END OF SECOND SEMESTER EXAMINATION
May 2022
FACULTY: Applied Sconces & Technology DEPARTMENT: Computer Science
PROGRAMME: BTech ICT (Top-Up) COURSE CODE: BICT 404
COURSE TITLE: Cioud Computing LEVEL: 400
ACADEMIC YEAR: 2021/2022 TOTAL MARKS: 60
DUR TION: 2Hours EXAHINER: Dr. M Adan
INSTRUCTIONS
1. The questions are in TWO sections. Section A caries a total of $0 marks and Section B
cartes a total of 30 marks.
12. Section Ais objectives. Each question in Section A carries 1 mark. White ONLY the
‘alphabet of the correct answer in the answer booklet.
{3 Section B is subjective. Each question in Section B caries 10 marks. Please answer
'ANY THREE questions in section Bin the answer bookiet provided.SECTION A (30 MARKS)
4. Enity that manages the use, performance and delivery of cloud services and negotiates
‘relationships between cloud providers and cloud consumers is?
‘A) Cloud service provider
B) Cloud service consumer
©) Cloud service broker
) Cloud service operator
2. An organisation that sorves as a thirc-party entity as a centralised coordinator of cloud
‘services for other organisations and enables users to interact through @ single interface with
‘Multiple service providers is?
‘A) cloud broker
B) Service Arbitrage
C) Cloud service provider
D) Service arbiter
3. An IT role and business modal in which a compary or other ently adds value to one or
‘mare (public or private) cloud services on beh of one or more consumers ofthat service via
three primary roles inclsing aggregation, integration and customisation brokerage is?
*) Cloud service brokerage
B) SLA-bac2¢
) Externally r-anaged brokers
) Trigger-acton bes
4. The converse of < or. sgn end evallilty is?
{A)Diselosir= eration, and Removal
B) Auditing, Cnanges, sn Diciosure
G) Avallabi'y. erty. ne Confdentiaty
D) Alteration, Disccszie. and Cncuty
5 {is vilusi crv'onmant ‘at makes the scrices of one or more data centers
available through e sinale interface and biling structure.
A) Virtuaisavo0
8) Cloud
©) Data contar
D) Virtual ricer
6. Each ype of cious implementation provides a afferent paradigm of and,
‘A) Control and access
8) Scalability and
) Latency and control
) On-tomand and availabilty
tty7A primary motivation for using public cloud services is that an organization can.
‘A) Provision an environment to host a web application with very Ittle
Investment
8) Quickly cut down on large upfront cost to getup and running
CC) Pradit the capacity of resource nesded and how much itcan grow
) Easily scale up and down ther resource needs
£8, Which ofthe following is not an SMI attribute?
‘A) Financial
8) Agiity
©) Scalabity
D) Assurance
©, Identity the wrong statement below:
'A) Cloud services span the gamut of computer applications
'B) The impact of cloud computing on network communication is to discourage
the use of open source network protocols in place of proprietary protocol
(¢) Atom ie a syndication format tat allows for HTTP protocols to create and updates
Information
1D) None of the mentioned
410. Confidentiality is sometimes confused with
A) Privacy.
B) Authentity.
) integrity.
) Nonrapuciation,
14 refers tothe ability to identity the person or entity with whom you are dealing on
the Internet
‘A) Nonrepudiation
B) Althenticity|
©) Availabilty
D) Integrity
+412, Accessing data without authorization on Dropbox isan example of which ofthe following?
‘A) Social network security issue
B) cloud security issue
C) Mobile platform securly issue
) Sniting43, Virtualization has become an indspensable ingredient for almost every Cloud; the most
jbvious reasons being the ease of
{A) Abstraction and encapsulation.
8) Installation and maintenance
(0) Use and perceived usefulness
) Avalabilty and on-demand
14, ____refers to progressive activity that examines either the provider's
system or the users of services to ensure there is no attack detection,
A) Austing
B) Monitoring
C) Incident response
) Security testing
46. In the NIST defrition of cloud computing, what does the statement “shared pool of
corfigurable computing resources” Include?
‘A)Data security, associated with los or availabilty of data causing business disruption
'B) Networks, servers, storage, applications, and services
C} Five essential characteristics, three deployment models, three service models
D) Leverage cloud services over the open internet on hardware owned by the cloud
provider
416. Which of these are fulleervce clous platforms? (Wie all alphabets which apply to the
answer)
‘A)IBM Cloud
88) Amazon Web Services
} Google Cloud Platform
D) Microsoft Azure
A,B, and C only
A.B,CandD
‘and B only
Acnly
417. What is the three-way symbiotic relationship between foT, Al, and cloud?
‘A) Power, scale, dynamic nature, and economies ofthe cloud resources
88) Al consumes the data produced by loT devices
6) loT delivers that data, Al powers the insights, and both emerging
technologies leverage cloud scalability and processing power
D) Making sense ofthe endless streams of data from loT devices
418, Which one of the folowing options is true for inrastructute-as-a-service?
‘A) Cloud provider configures the infrastructure whic
the usericustomer organization
8) Cloud provider manages the physical resources, the platform resources,
‘managed and main
wed byapplications, and data
©) Cloud provider owns, manages, and maintains the physical resources
) Cloud provider manages the pricical resources, operating systems, development
tools, databases, and business analytics
19. Which are some of the key components of cloud Infrastructure-as-a-Service? Select two
A) laaS providers manage the hypervisors and provision virtual instances
8) laaS providers manage largo data centers that contain the physical
‘machines required to power the various layers of abstraction on top of them
CC) laaS providers deploy the middleware and install required applications on the
virtual machines
) laaS providers manage the hypervisors and end-users provision the vitual
Instances
20. Which one ofthe folowing is @ key characterises of Software-2s-a-Service?
'A) Security, compliance, and maintenance ofthe software are the responsibilities of
the user
B) SaaS services do not provide options for user customization
CC) Single tenant architecture
) Ensure every user has access to the same, centrally located, infrastructure
‘and application code
21. Which of the following statements is NOT a correc statement about Private clouds?
1) Private clouds can be implemented intemally or externally
'B) VPC Is an example ofa type of Prvato cloud
(C) Private clouds are suitable for workloads that require maximum control and
security
) Private clouds can only be deployed on-premise n an organization's own
atacentre
sz. en eginzaton rete on aH sno andro cel epson with
22 an expan ret cpt eaten, wh be our eal wou
eran curr?
1 Pull
By pwat coud
Gye cears
Symon cas
29, Each dloud region can have mulple zones (also known as avaltlty zones), What are
zones?
'A) Standardized containers of computing resources
6) Single shared point of allure
{¢) Unique physical locations with one or more datacenters
1) Goographical area or region where cloud prover’ infrastructure fs clusteredapplications, and data
Se pela our sy, ar meta pe ames
>) Cloud provider manages the pical resources, operating systems, development
tools, databases, and business analytics
48. Which are some of the key components of cloud Infrastructure-as-a-Service? Select two
|A)laaS providers manage the hypervisors and provision virtual instances
8) laaS providers manage large data centers that contain the physical
‘machines required to pover the various layers of abstraction on top of them
C) laa providers deplay the middleware and install required applications on the
virtual machines
) laas providers manage the hypervsors and end-users provision the virtual
instances
20, Which one ofthe following is @ Key charactristics of Software-as-a-Servce?
'A) Securty, compliance, and maintenance of the software are the responsibilities of
the user
'B) Saas services do not provide options for user customization
C) Single tenant architecture
1) Ensure every user has access tothe same, centrally locate, infrastructure
‘and application code
‘D1. Which ofthe following statements fs NOT a correct statement about Private clouds?
'A) Private clouds can be implemented interally or externally
8B) VPC is an example of a type of Private loud
CC) Private clouds are sutable for workloads that quire maximum contol and
securiy
) Private clouds can only be deployed on-premise, in an organization's own
datacentre
control operational assurance
‘schniques that ean be employed to ensure
4. Broly explain the two basic
a
ostion2
2 lust ike the 7-ayered OSF-model of data networks, cloud architecture is layered. With aid
of correct diagram, explain the components ofa layered model of cloud computing. [7]
‘2b. Name and explain three cloud resource provisioning mothods a
‘a, The CIA Tad isan industry-aocepted model for ensuring secur in systems. Describe
the components ofthe CIA tad. ‘6
4b, Clu security concerns can be clasted into tasitonal,avaiabilty and thie-party data
contol eoncerns. Briefly explain the traditional taxonomy of cloud security concem [4]‘Question 4
4a, Explain FOUR practices that can be used to manage privacy inthe cloud
4b. Akey feature of cloud computing is mult-tenancy. Explain FOUR advantag
rmultitenancy nature of cloud computing
}
gos ofthe
4
4c. Broly explain multi-level service level agreement in a cloud computing environment. [2]