DEPARTMENT OF CSE/IT/DS/AIML
AY 2025 - 2026
Question Bank
For
CLOUD COMPUTING
(Common to all Branches)
R22 IV Year I Semester
CSE /IT/DS/AIML
Unit-1
S. No Descriptive Questions Marks CO PO BTL
a)What is the main goal of cloud computing?
1M 1 5 1
b)Which computing paradigm brings computation closer
1 to data sources, like IoT devices? 1M 1 3 1
c) Compare and contrast parallel computing,
distributed computing, and cloud computing. 10M 1 2 2
a)Name one example of a cloud service provider. 1M 1 5 1
b)Expand SaaS in cloud computing 1M 1 1 4
c) Compare high-performance computing (HPC) with
cluster computing in terms of architecture, scalability,
2 and application domains.
5M 1 2 2
d) Explain the concept of quantum computing and
analyze how it differs fundamentally from classical 5M 1 1 1
computing paradigms.
a)Name the computing paradigm based on the principle
of quantum mechanics. 1M 1 5 2
3 b)Name one example of a cloud service provider. 1M 1 3 2
c) Explainthe difference between nano computing and
optical computing? 10M 1 5 1
a)Define cloud computing in one sentence 1M 1 2 2
b)Name the four types of cloud deployment models. 1M 1 5 1
c)Discuss the five essential characters
4 5M 1 2 2
ofcloudcomputing?
d) Explain in detail the layered architecture of cloud
computing. 5M 1 5 2
a)Which cloud provider offers AWS? 1M 1 5 1
b)Name any two benefits of cloud computing. 1M 1 3 4
5
c) Explain the challenges in cloud architecture design.
10M 1 1 2
a)Name the three layers of cloud architecture 1M 1 2 1
b)What does resource pooling mean in cloud
architecture? 1M 1 2 1
6
c) Explain briefly managing the cloud infrastructure? 5M 1 5 2
d)Explain cloud elasticity and scalability. 5M 1 5 1
UNIT-I
Objective Questions
Multiple choicequestions:
1. If one node fails in distributed system then [ ]
a) There mining nodes can continue operating
b) All the sites will stop working
c) Directly connected sites will stop working
d) None of the mentioned
2. The capability of a system to adapt the increased service load is called [ ]
a) scalability b)tolerance c)capacity d) none of the mentioned
3. It is the simultaneous use of multiple compute resources to solve a computational
problem [ ]
a) Parallel computing b)Single processing c) Sequential computing d)None of these
4. Leads to concurrency. [ ]
a) Serialization b) Parallelism c) Serial processing d)Distribution
5. Which of the following is not a type of cloud? [ ]
a) Private b) Public c)Protected c)Hybrid
6. Which of the following architectural standards is working with cloud computing industry?
[ ]
a) Service-oriented architecture b) Standardized Web services
c) Web-application frameworks d) Web-based architecture
7. Which of the following is an example for cluster computing? [ ]
a) High Performance b) Scalable c) Availability d) All of these
8. Uses of widely distributed computer resources to reach a common goal. [ ]
a) Cluster Computing b) Grid Computing c) Cloud Computing d) Utility Computing
9. Cloud Computing refers to? [ ]
a. Accessing the hardware B. configuring the hardware
C. Manipulating the hardware D. All of the above
10. Which of the following is the working model for cloud computing? [ ]
a. Deployment Model B. Configuring Model
C. Collaborative Model D. All of the above
Fillinthe blanks
11. _ uses distributed systems to solve computational problems.
12. _ nodes can be packaged in a compactor a slack fashion.
13. __can be defined as a network of computers working together to perform
at ask that would rather be difficult for a single machine.
14. In quantum computing, a _____________ can exist in a Superposition, carrying
the value of both 1 and 0 at the same time.
15. _________is acting of creating a virtual (ratherthanactual) version of
something, including virtual computer hardware platforms, storage devices, and computer
network resources.
16. __ use biologically derived materials to perform computational functions.
17. In a cloud, services are delivered over a network that is open for use by anyone.
18. In , services are shared by organizations with similar data processing
requirements and a common approach to privacy.
19. ________ layer comprises the operating system and other requisition
structures and is based over the infrastructure layer.
20. Is the top most layer -contains applications that directly interact with the end-user.
UNIT-1 –Objective Key
21.
[Link]. Answer [Link]. Answer
01 A 11. Distributed computing
02 A 12. Cluster
03 A 13. Grid computing
04 B 14. Qubit
05 C 15. virtualization
06 A 16. Bio-computers
07 D 17. Public
08 B 18. Iaas
09 D 19. Platform
Application Layer
10 A 20.
Unit-2
S. No Descriptive Questions Marks CO PO BTL
a. List the four main Cloud Deployment Models. 1 2 1 1
b. Define Infrastructure as a Service (IaaS). 1 2 1 1
1
c. Describe the issues in On-Premise and Outsourced Private 10 2 2,7 2
Cloud.
a. What are the Characteristics of Hybrid Cloud? 1 2 1 1
b. What is SLA? 1 2 1 1
2
c. Describe the IaaS Model with its features, Pros and Cons. 10 2 1,2 2
a. Explain two advantages and disadvantages of the Hybrid Cloud. 1 2 2 2
b. Define Multicore Technology. 1 2 1 1
3
c. Explain Web 2.0 with its Characteristics and Applications? 10 2 1,5 2
a. What is Community Cloud? 1 2 1 1
b. What are the various Technologies used by SOA? 1 2 1,5 1
4
c. Describe about Characteristics and Suitability of Private Cloud. 5 2 1,2,7 2
d. Explain Components and Characteristics of Web 3.0. 5 2 1,5 2
a. Why Public Cloud is less Secure?Justify. 1 2 6,8 4
b. Explain the role of OS in Cloud Computing. 1 2 1 2
5
c. Compare PaaS and SaaS in terms of their suitability for 5 2 2,11 4
business.
d. Define Pervasive computing and explain how it helps in Cloud 5 2 1,5 2
Computing.
a. What is Outsourced Community Cloud? 1 2 1 1
b. Describe the Cloud OS Requirements. 1 2 1 2
6
c. How does the cloud computing paradigm help in effective 5 2 3,5 3
application development?
d. Explain the differences between a web OS and a cloud OS. 5 2 2,4,5 4
I. Multiple Choice Questions (MCQs)
1. Which of the following is considered the most secure among the four main cloud deployment
models? [ ]
A. Public Cloud B. Community Cloud C. Private Cloud D. Hybrid Cloud
2. The hybrid cloud is typically a combination of: [ ]
A. Private cloud and community cloud B. Public cloud and private cloud
C. Community cloud and public cloud D. Two public clouds
3. In the public cloud model, which of the following is NOT an advantage? [ ]
A. High scalability B. Strict SLAs
C. Complete organizational autonomy D. No need for infrastructure setup
4. Which of the following cloud service models primarily focuses on providing [ ]
Virtualized computing resources over the internet?
A) SaaS B) IaaS C) PaaS D) NaaS
5. Which cloud service model allows developers to focus on coding and Developing applications
without worrying about underlying infrastructure? [
]
A) IaaS B) PaaS C) SaaS D) STaaS
6. Which of the following is NOT a characteristic of Software as a Service (SaaS)? [ ]
A) It delivers software applications over the internet.
B) Users can modify the software code according to their needs.
C) Software updates and maintenance are handled by the provider.
D) It is accessible from any device with an internet connection.
7. Which of the following technologies enables cloud computing to be more modular, by
providing a framework for building loosely coupled services? [ ]
A) Multicore Technology B) Web 2.0
C) Service-Oriented Architecture (SOA) D) Pervasive Computing
8. Which of the following is a significant advantage of using multi-core technology in cloud
computing? [ ]
A) It increases the need for manual management of virtual machines.
B) It helps process more data in parallel, improving performance.
C) It eliminates the need for cloud service providers.
D) It limits the scalability of cloud applications.
9. Web 2.0 and Web 3.0 primarily impact cloud computing by enhancing _________ [ ]
A) Interactive applications and the evolution of the Internet.
B) Security protocols and data encryption methods.
C) The physical infrastructure of cloud servers.
D) Traditional desktop computing models.
10. Pervasive computing, also known as ubiquitous computing, is important for cloud
computing because it allows ____________. [ ]
A) Cloud services to be provided solely on personal computers.
B) Cloud services to be integrated into everyday objects and devices.
C) A reduction in the number of devices connected to the Internet.
D) Servers to handle only specialized computing tasks.
II. Fill in Blanks
11. The _____________ cloud is provisioned for exclusive use by a single organization and may be
managed internally or by a third party.
12. In a community cloud, resources are shared among organizations with a ______________
cause.
13. In the hybrid cloud, the public cloud portion adds _________________to the private cloud
environment.
14. _____________ is a cloud service model that provides hardware and networking resources, such
as virtual machines and storage, over the internet.
15. In the Platform as a Service (PaaS) model, developers can build applications using the provided
platform, but they do not need to manage the underlying ___________________ Infrastructure.
16. The main advantage of Software as a Service (SaaS) is that users can access Software
applications from anywhere with an internet connection, without needing to worry about
__________________or maintaining the software.
17. Service-Oriented Architecture (SOA) enables cloud computing by____________software
components into loosely coupled services that can be accessed over the network.
18. Multi-core technology improves cloud computing performance by allowing multiple
____________ to be processed simultaneously, increasing overall efficiency.
19. Web 2.0 and Web 3.0 are focused on improving the _______________ of applications, making
them more interactive and user-centric.
20. In the context of cloud computing, pervasive computing refers to the integration of computing
capabilities into everyday objects and devices, enabling ______________access to cloud services.
Objective Key
1. A 11. Private
2. B 12. Common
3. C 13. Scalability
4. B 14. Iaas
5. B 15. Hardware
6. B 16. Updates
7. C 17. Dividing
8. B 18. Tasks
9. A 19. Usability
10. B 20. Continuous
Unit-3
C P
[Link] Descriptive Questions Marks BTL
O O
a) What is Virtualization? 1M 3 2 1
b) List out the benefits of virtualization? 1M 3 2 2
1. C) What are the different approaches to
10M 3 4 5
Virtualization?
a) What are the drawbacks of Virtualization? 1M 3 3 1
b) Define Hypervisor? 1M 3 4 1
2.
c) Explain in detail about Virtualization opportunities? 10M 3 1 5
a) List out the types of Hypervisors? 1M 3 2 1
b) What are the two possibilities of attacking the
1M 3 3 3
Hypervisor?
3. c) List the best practices to keep the hypervisor
5M 3 2 5
secured?
d)How can we prove that Virtualization and cloud
5M 3 2 1
computing are different?
a) What is the Role of middleware in cloud
1M 3 4 1
programming?
b)Give one example of a Type 2 hypervisor 1M 3 5 1
4.
c) Discuss in detail the migrating application to cloud. 5M 3 1 6
d) Write a short note on MapReduce? 5M 3 1 6
a) What is the role of middleware in cloud
1M 3 2 1
computing?
c) List out the key features of Cloud Haskell? ? 1M 3 3 2
5.
c) Explain in detail about the suitability of Saas?
5M 3 1 5
d ) List some of the benefits of Saas?
5M 3 1 2
a) Mention two examples of PaaSproviders? 1M 3 1 2
b) Give one example of a Type 2 hypervisor? 1M 3 4 3
6.
c) Discuss the challenges that make the SaaS
development difficult? 10M 2 1 6
UNIT-III
Objective Questions
Multiple choice questions
1. Cloud Computing refers to? [ ]
A. accessing the hardware B. configuring the hardware
C. manipulating the hardware D. All of the above
2. Which of the following is the working model for cloud computing? [ ]
A. Deployment Model B. Configuring Model
C. Collaborative Model D. All of the above
3. provides the runtime environment for applications, development and
deploymenttools, etc. [ ]
A. IaaS B. PaaS C. SaaS D. XaaS
4. Which of the following are true characteristics of SaaS service model? [ ]
A. The software applications are maintained by the vendor.
B. They can be scaled up or down on demand.
C. SaaS applications are cost-effective since they do not require any maintenance at end user
side.
D. All of the above
5. Which of the following are benefits of IaaS? [ ]
A. Flexible and efficient renting of computer hardware.
B. Portability, interoperability with legacy applications.
C. Full control of the computing resources through administrative access to VMs.
D. All of the above
6. Which of the following are benefits of PaaS? [ ]
A. Lower administrative overhead
B. Lower total cost of ownership
C. More current system software
D. All of the above
7. Which of the following is associated with considerable vendor lock-in? [ ]
A. PaaS B. SaaS C. IaaS D. DaaS
8. Which of the following are correct technologies working behind the cloud
computingplatforms? [ ]
A. Virtualization B. Service Oriented Architecture
C. Grid Computing D. All of the above
9. In Grid Computing, computer resources are? [ ]
A. Heterogeneous dispersed. B. geographically dispersed.
C. Both A and B D. None of the above
10. Managed IT services are based on the concept of? [ ]
B. Virtualization B. SOA C. Grid Computing D. Utility Computing
Fill in the blanks
11. Utility computing is based on .
12. consists of servers, storage devices, network, cloud management
software, deployment software, and platform virtualization.
13. Resource allocation and de-allocation services provided by .
14. Flexible and efficient renting of computer hardware is provided by cloud
computingmodel.
15. SaaS applications are .
16. Cloud Computing Architecture contains front end and .
17. also called the virtualization layer, where all the servers are pooled together
into one.
18. layer comprises the operating system and other requisition structures and is
based over theinfrastructure layer.
19. is the topmost layer - contains applications that directly interact with the end-user.
20. deploys software that makes an abstraction layer across computer hardware,
letting the hardware components such as processors, memory, storage etc. of a particular
computer to be segmented into several virtual elements.
Objective Key
[Link]. Answer [Link]. Answer
1 D 11 Pay what you use model
2 A 12 Cloud Infrastructure
3 B 13 Cloud service Providers
4 D 14 Iaas
Dropbox, Google Workspace,
5 D 15 and Salesforce
6 D 16 back end
7 A 17 Infrastructure Layer
8 A 18 Platform
9 C 19 Application Layer
10 D 20 Virtualization
UNIT-4
[Link] Descriptive Questions Marks CO PO BTL
1 a. What are the two main classifications of data centers? 1 4 1 1
b. List the classification of Data Centers (Tier1-4) and its 1 4 1,2 2
features.
c. Explain the major transport layer issues and TCP 10 4 2,4 4
Impairments in DCNs.
2 a. What are the three tiers of servers in the multitier data 1 4 1 1
center model?
b. Why are servers placed in single rows forming corridors 1 4 1,7 2
(aisles)?
c. Explain the services provided by Google Cloud Platform 10 4 1,5,12 2,3
with examples.
3 a. State one advantage and one disadvantage of a two-tier 1 4 1,2 2
network topology.
b. What is pseudo congestion effect in virtualized DCNs. 1 4 2,4 2
c. List the tools/services provided by Microsoft and explain 10 4 1,5 2
them in brief.
4 a. List the Major cloud service providers. 1 4 1 1
b. Describe the tools available for managing Google Cloud 1 4 1,5 2
Storage.
c. Explain Networking issues in Data centers. 5 2,4 4
d. Explain the different types of traffic in DCNs along with 5 4 1,2 2
their requirements.
5 a. What is vCloud? 1 4 1 1
b. Explain the features of Aneka. 1 4 1,5 2
c. Explain how cooling infrastructure is managed in modern 5 4 7,12 2
data centers.
d. Explain in detail the four types of network accesses 5 4 1,2 2,3
required in data centers.
6 a. Explain SAP HANA Cloud. 1 4 1,5 2
b. Explain the services provided by IBM SmartCloud. 1 4 1,5 2
c. What are the services offered by EMC IT? Explain. 5 4 1,5 2
d. Explain in detail the architecture and modules of Captiva 5 4 1,3,5 3,4
Cloud Toolkit with examples.
(OBJECTIVE)
Multiple choice questions
1) Which protocol is primarily used for communication over the internet in cloud computing? [ ]
a) FTP b) TCP/IP c) SMTP d) POP3
2) Which of the following provides isolation and abstraction in a cloud network? [ ]
a) Virtual LANs (VLANs) b) VPN c) Firewalls d) NAT
3) Which of the following is used for secure communication in cloud networks? [ ]
a) HTTPS b) HTTP c) FTP d) SNMP
4) Which of the following is the largest cloud service provider globally? [ ]
a) Microsoft Azure b) Amazon Web Services (AWS)
c) Google Cloud Platform (GCP) d) IBM Cloud
5) Which of the following is Google’s cloud platform? [ ]
a) G-Suite b) Google Compute Engine
c) Google Cloud Platform (GCP) d) Google App Service
6) Which of these is not a cloud service provider? [ ]
a) AWS b) Azure c) Hadoop d) Google Cloud
7) Google App Engine is an example of [ ]
a) IaaS b) PaaS c) SaaS d) FaaS
8) Azure’s serverless computing platform is called [ ]
a) Azure Functions b) Azure Kubernetes c) Azure Storage d) Azure Logic
9)AWS EC2 stands for [ ]
a) Elastic Cloud Computing b) Elastic Compute Cloud
c) Enterprise Cloud Computing d) Enhanced Compute Cloud
10) Salesforce is primarily known as a [ ]
a) ERP software b) CRM platform
c) Database management tool d) Social media platform
Fill in the Blanks
1. ------------------------of the OSI model ensures reliable transmission of data in cloud networking.
2. -------------------protocol is mainly used for email transfer in cloud applications.
3. AWS provides a serverless computing service called ____.
4. The virtual machines in Microsoft Azure are called ____.
5. The service model where applications are delivered over the internet on demand is called ____.
6. Oracle Cloud is mostly popular for its ____ services.
7.____ is the DNS and traffic routing service provided by AWS.
8. The storage service offered by Microsoft Azure is known as ____.
9. Google Cloud’s machine learning service is called ____.
10. The Salesforce marketplace for third-party apps is called ____.
Objective Key
1 B 1 Transport Layer
2 A 2 SMTP
3 A 3 AWS Lambda
4 B 4 Azure Virtual Machines
5 C 5 SaaS (Software as a Service)
6 C 6 Database
7 B 7 Route 53
8 A 8 Azure Blob Storage
AI Platform (or Vertex AI in new
9 B 9 version)
10 B 10 AppExchange
UNIT –V
S. No Descriptive Questions Marks CO PO BTL
a) Define Security governance? 1M 5 5 1
b) List the security issues in Cloud?? 1M 5 3 2
1.
c) Write elaborately about Security governance in Cloud? 10M 5 2 3
a) Define Load Balancing? 1M 5 5 1
2. b) Distinguish between platform level and software level 1M 5 1 4
security?
c) Discuss about Security Images? 5M 5 2 2
d) Explain in detail about Software-as-a-Service security? 5M 5 2 2
a) Illustrate the layers in security architecture design? 1M 5 2 3
b) Define Network-as-a-Service in Cloud? 1M 5 5 2
3.
c) Explain the challenges in cloud computing security 10M 5 4 2
briefly?
a) Discuss application security services in Cloud? 1M 5 2 3
b)Define data privacy schemes? 1M 5 2 2
4.
c) Discuss about Security monitoring techniques in Cloud? 5M 5 3 2
d) Explain the Secure Software Development Life Cycle? 5M 5 2 3
a) Discuss about security awareness in cloud computing? 1M 5 4 2
b) Explain change management? 1M 5 2 2
5.
c) Discuss about Cloud Management Tasks and their 10M 5 1 2
benefits?
a) Explain about Cloud Management Tasks and benefits? 1M 5 2 4
b) Compare server and server less orchestration? 1M 5 2 5
c) Describe about Identity management and access control 5M 5 4 4
6.
in cloud networks?
d) Summarize about CSPM and DLP in cloud security 5M 5 2 5
services?
Multiple choice questions :
1. Which of the following is NOT a security risk in cloud computing?
a) Data Breaches [ ]
b) Account Hijacking
c) Insecure Interfaces and APIs
d) Business Agility [D]
2. Which cloud service model provides the least amount of built-in security? [ ]
a) SaaS b) PaaS c) IaaS d) All of the mentioned [A]
3. Which of the following is NOT a security risk in cloud computing? [ ]
a) Data Breaches
b) Account Hijacking
c) Insecure Interfaces and APIs
d) Business Agility [D]
4. Which of the following is a key aspect of securing cloud environments? [ ]
a) Encryption b) Authentication c) Blocking d) Validation [A]
5. What is the responsibility model in cloud computing? [ ]
a) Sharing computing resources with other users
b) Distributing data across multiple servers
c) Defining the division of security responsibilities between the cloud provider
and the customer
d) Virtualizing network infrastructure
6. What is a common security concern related to multi-tenancy in cloud computing? [ ]
a) Lack of internet connectivity
b) Data segregation
c) Limited scalability
d) Insufficient processing power
7. What cloud deployment model allows organizations to have the highest level of [ ]
control over their infrastructure?
a) Public cloud
b) Private cloud
c) Hybrid cloud
d) Community cloud
8. Which security challenge is associated with the "shared responsibility model" in [ ]
cloud computing?
a) Lack of scalability
b) Data segregation
c) Limited customization options
d) Unclear security responsibilities
9. What is the primary purpose of a Virtual Private Network (VPN) in cloud [ ]
security?
a) Data storage
b) Network isolation
c) Server management
d) Cloud resource optimization
10. What is the term for a security measure that restricts user access to only the [ ]
information and resources necessary for their role?
a) Least privilege principle
b) Role-based access control
c) Network segmentation
d) Identity and Access Management (IAM)
Fill in the blanks
11. ____________secures data by applying mathematical function to generate fixed size string.
12. __________________is maintained by Cloud Security Posture Management(CSPM).
13. ______________ is primary goal of Cloud Security Access Brokers (CSAB)
14. ________________ a security attack where attacker injects malicious scripts into web pages
15. ________________enforces security policies for web applications
16. __________________AWS service is designed for building, training and deploying machine
learning models at scale.
17. KVM stands for ________________________
18. Google Compute Engine released in ___________
19. There are ______ dimension types in Cloud Cube
20. Cloud elasticity in computing will __________ or ___________ client configurations
dynamically
Objective Key
[Link]. Answer [Link]. Answer
01 D 11 Hashing
02 A 12 Security Configuration
03 D 13 Enforcing Security Policies
04 A 14 Cross - Site Scripting (XSS)
05 C 15 Web Application Firewall
06 B 16 Amazon Sage Maker
07 B 17 Kernel Based Virtual Machine
08 D 18 2012
09 B 19 4
Scale Down
10 B 20
Scale Up