Exam Details

Subject elective – ii : cloud computing
Paper
Exam / Course m.c.a. s.y.(engg.)
Department
Organization solapur university
Position
Exam Date October, 2018
City, State maharashtra, solapur


Question Paper

T.Y. M.C.A. (Part (under Faculty of Engg.) Examination, 2018
Elective II Cloud Computing
Day and Date Tuesday, 18-12-2018 Total Marks 100
Time 10.30 a.m. to 1.30 p.m.
Instructions Figures to the right indicate marks.
Q. 3A and Q. 5A are compulsory.
Write a program if necessary.
1. Choose the correct answer (20×1=20)
Cloud computing provides a means by which we can access the
applications as utilities, over the Internet.
Tools Utilities Scripts All of the above
layer is first layer of OSI model.
Network layer Application layer
Data link layer None of the above
The allows systems and services to be accessible within an
organization. It offers increased security because of its private nature.
Private Public Hybrid Community
IaaS model access the fundamental resource as well as physical
resource and virtual machine
Physical resource Virtual machine
Both and None of the above
layer of data center network provide connectivity for server
resource pool.
Core layer Aggregation layer
Access layer All of the above
Services are delivered through internet, therefore
Reliable Location independence
Flexible None of the above
In cloud model data is hosted off-site and resources are
shared publicly, therefore does not ensure higher level of security.
Private Public Hybrid Community
Private cloud in hybrid cloud ensures higher degree of security
Higher Lower
Medium None of the above
Public cloud allow consumer to access computing resource through
administrative access in virtual machine
Physical Virtual
Both and None of the above
10) are responsible such as back-up and securing.
End user Middle staff Providers Both and
11) Firewalls, gateways and VPNs prevent hackers from gaining backdoor
access to the corporate network
Backdoor access Data access
Administrative access All of the above
12) security begins with screening of employee who will access
computer.
Physical Logical
Behavioral None of the above
13) Account or service hijacking is not new software vulnerabilities
Account Service Both and All of the above
14) Which is one of the series issues in cloud computing environment
Data loss Data stealing
Data integrity None of the above
15) mechanism must be embedded in all cloud security solutions.
Privacy-protection Data protection
Access protection None of the above
16) is core issue in many challenges in cloud computing
Access control Policy Privacy All of the above
17) Which service provides the application delivery through web browser to
end user
SaaS PaaS IaaS All of the above
18) Your data may be tampered while it is under the purview of your service
provider's infrastructure is
Tampered issue Security issue
Data ownership issue All of the above
19) In relation to data security, data may be while it is under the
preview of your service provider's infrastructure.
Changed Modified
Tampered None of the above
20) Servers are often referred to by their functions is server.
SQL Exchange File All of the above
2. Write short note on (any 20
Cloud computing
Befits of virtualization
Cloud Computing Software as Service (SaaS)
Hybrid cloud model
Data centre network architecture.
3. Explain in detail Public Cloud Model. 10
Describe in brief infrastructure as Service offerings. 10
OR
What are the top IaaS vendors Explain their products in brief. 10
SECTION II
4. Write a short note on (any 20
Multi cloud applications management
Data loss and leakage
Security issues in cloud computing
Insecure interfaces and APIs
Virtual machine monitor.
5. Explain current issues in cloud computing leading to future research. 10
Describe in brief different benefits of multi-cloud management. 10
OR
What are different types of virtualizations Explain in brief. 10


Other Question Papers

Subjects

  • advanced internet technology
  • data warehousing and data mining
  • design and analysis of algorithm
  • discrete mathematical structure
  • discrete mathematical structure (paper – i)
  • elective : 1) artificial technology
  • elective – ii : cloud computing
  • information security
  • mobile communication
  • operations research
  • programming in java