116 - 288.
Important MCQS
1. MCQ: MTBF stand for______________.
Correct Answers mean time between failure
2. MCQ: CSP stand for_______________.
Correct Answers Cloud Service Provider
3. MCQ: SSL stand for _____________.
Correct Answers Secure Socket Layer
4. MCQ: CIS stand for_____________.
Correct Answers Cloud Information Service
5. MCQ: The __________is called Cloudlet.
Correct Answers workload unit
6. MCQ NO : The characteristics of big data can be represented by ________.
Correct Answers 4vs:
7. MCQ: _______________consideration is applied to ensure SLA is not violated.
Correct Answers QoS
8. MCQ: _____________ scheduling, the task starvation can be avoided.
Correct Answers: Priority-Based
9. MCQ: SLA violation when IT resources are__________.
Correct Answers: overloaded
10. MCQ: Effective resource scheduling reduces______.
LEARNING MATERIALS
Correct Answers: Execution time
11. MCQ : The best option is to move the data center to
BSCS | Pakistan.
Correct Answers: Cloud
12. MCQ: It is a third party process of finding the appropriate Cloud provider.
Correct Answers: : Cloud Brokerage
13. MCQ: The _______________clustering creates a high-availability cluster across multiple
physical servers.
Correct Answers: Hypervisor
14. MCQ: VMs hosted on a physical server are managed by________.
Correct Answers: hypervisor
15. MCQ : Advantages of Mobile Cloud Computing:
Correct Answers: Extending battery lifetime
16. MCQ: ____________architecture is used for provisioning of dedicated IT resources.
Correct Answers: Resource reservation
17. MCQ: SDN stand for_________.
Correct Answers: Software Defined Networking
18. MCQ: API stand for_________.
Correct Answers: application program interface
Common types of Resource Cluster Mechanism
➢ Server Cluster
➢ Database Cluster
➢ Large Dataset Clusters
Uses of remote administration console
➢ Capacity planning
➢ Provision and releasing IT resources for on-demand usage
➢ Configure and setting cloud services
➢ Managing user accounts, security credentials, authorization and access control
➢ Monitor cloud service status, usage and performance
A Cloud service may become disruptive/unavailable/down due to:
➢ Over burden of processing load
➢ Scheduled updates
Cloud Balancing Architecture improves/increases the following features:
➢ Load balancing
➢ Performance and scalability of IT-resources
➢ Availability and reliability of IT resources
In Dynamic Failure Detection and Recovery Architecture, The resilient watchdog module
performs the following five core functions:
➢ Monitoring
➢ Identifying an event
➢ Executing the reactive routine/s
➢ Reporting
Dynamic Failure Detection and Recovery Architecture allows the implementation of an
automated recovery policy consisting of predefined steps and may involve actions such as:
➢ Running a script
➢ Sending a message
➢ Restarting services
Following are the steps in Bare-Metal Provisioning Architecture:
➢ Consumer connects to central software through self-service portal.
➢ The available servers are shown.
➢ The consumer choses the server and the OS to be installed.
➢ The resource management system is used to install the required chosen OS.
➢ The consumer starts using the provisioned server.
Following are the steps in Rapid Provisioning Architecture:
➢ A consumer chooses a VM package through self-service portal and submits the
provisioning request.
➢ The centralized provisioning module selects an available VM and initiates it through a
suitable template.
➢ Upon initiation, the baseline/s templates are applied.
➢ The VM is ready to use now.
[ Cloud Consumer’s Perspective ] The administrative rights of the IaaS consumer includes,
controlling of:
➢ Life cycle of VM (powering-On/Off and restarting)
➢ Cloud storage attachment
➢ Basic software installations (OS and pre-installed software)
➢ Passwords and credentials
➢ Costs
[ Cloud Consumer’s Perspective ] Typically, a PaaS consumer receives the following:
➢ Cloud emulation environment
➢ Class libraries
➢ Software libraries
➢ Frameworks
➢ Databases
[ Cloud Consumer’s Perspective ] The administrative rights of the PaaS consumer includes,
controlling of:
➢ Cloud storage device selection
➢ Choosing the tools in case of ready-made environment
➢ Deployment of automated scaling listener, load balancer and replication etc.
➢ Login management of service/s developed/deployed using PaaS instance
➢ IT-resource usage cost
[ Cloud Consumer’s Perspective ] A few runtime configurations can be controlled by SaaS
consumers. These include:
➢ Security related configurations
➢ SLA monitoring
➢ Usage cost control
Inter-Cloud providers are of two types:
➢ With extra resources
➢ With resource shortage
Business Cost Metrics:
➢ Upfront Costs
➢ On-going Costs
Cost management can take place across the lifecycle phases of Cloud services. These phases
may include:
➢ Design & Development
➢ Deployment
➢ Service Contracting
➢ Provisioning & Decommissioning
The cost templates used by the providers depend upon:
➢ Market competition
➢ Overhead occurred during design, deployment and operations of the service
➢ Cost reduction considerations through increased sharing of IT resources
A pricing model for Cloud services can be composed of:
➢ Fixed and variable rates definitions
➢ Negotiations by consumers
➢ Cost customization possibilities
➢ Discount offerings
➢ Payment options
Two common metrics related to service measuring resiliency are as follows:
➢ Mean-Time System Recovery (MTSR) Metric
➢ Mean-Time to Switchover (MTSO) Metric
The key terminologies of privacy are:
➢ Data subject
➢ Data processor
➢ Data controller
Trust has two types:
➢ Hard trust
➢ Soft trust
➢ Dynamic trust (short term)
➢ Persistent trust (long term)
Five primary functions of Cryptography:
➢ Privacy
➢ Integrity
➢ Authentication
➢ Non-repudiation (A mechanism to prove the originality of the sender)
➢ Exchange of crypto keys which are the strings of bits used to change the format of the
data
Remedies for Denial of Service (DoS) attacks:
➢ Contact ISP to clarify the reason of downgraded network performance
➢ ISP can help in throttling malicious traffic
➢ Using DoS detection tools
Some prominent security protocols for wireless security are:
➢ Wired Equivalent Privacy (WEP)
➢ Wi-Fi Protected Access (WPA)
➢ Wi-Fi Protected Access 2 (WPA2)
Encryption helps in countering:
➢ Insufficient authorization
➢ Traffic eavesdropping
➢ Malicious intermediary
➢ Overlapping trust boundaries
There are two basic types of encryption:
➢ Symmetric Encryption
➢ Asymmetric Encryption
Identity and Access Management (IAM) Consist of four main components:
➢ Authentication (verifies user identities)
➢ Authorization (grants access to specific resources based on user roles and permissions)
➢ User management (creates, updates, and deletes accounts as needed)
➢ Credential management
Several factors affect the Cloud reliability:
➢ Network Dependence
➢ Safety-Critical Processing
The system requirements are of two types:
➢ Functional (What the cloud service should do)
➢ Non functional (How well the cloud service should perform)
Cloud Solution Design Metrics:
➢ Accessibility
➢ Audit
➢ Availability
➢ Maintainability
➢ Backup
In Cloud Resource Scheduling, There are two main steps:
➢ Resource provisioning
➢ Resource scheduling
Effective resource scheduling reduces:
➢ Energy consumption
➢ Execution time
➢ Execution cost
Cloud Resource Scheduling Fulfills following QoS requirements:
➢ Security
➢ Availability
➢ Reliability
➢ Scalability
Types of computational offloading:
➢ Static
➢ Dynamic
Generic characteristics of big data:
➢ Data volume is huge
➢ The data is generated, captured and processed at high speed.
➢ Data may not be categorized into regular relational databases
The characteristics of big data can be represented by 4vs:
➢ Value
➢ Volume
➢ Velocity
➢ Variety
popular models for big data:
➢ Distributed Map Reduce model (popularized by Hadoop)
➢ NoSQL model (used for non-relational, non-tabular storage)
➢ SQL RDBMS model (for relational tabular storage of structured data)
Software Defined Networking (SDN) has four characteristics:
➢ Standardized APIs
➢ Centralization of control plane
➢ Programmable control plane
➢ Separation of control and data planes
Online gaming consists of four basic building blocks:
➢ Networking module
➢ Input module
➢ Rendering module
➢ Game logic module
Effective resource scheduling reduces:( module no # 242)
➢ Execution cost
➢ Execution time
➢ Energy consumption
SDN has four characteristics (module no # 282)
➢ Separation of control and data planes
➢ Centralization of control plane
➢ Programmable control plane
➢ Standardized APIs
Advantages of Mobile Cloud Computing:
➢ Extending battery lifetime
➢ Improving data storage capacity and processing power
➢ Improving reliability
➢ Additionally