0% found this document useful (0 votes)
255 views3 pages

Iii Ai & DS - CCS362 - S & PC End Semester Exam QP

The document outlines the examination structure for the B.E./B.Tech. degree in Artificial Intelligence and Data Science at M.A.M. School of Engineering, focusing on the subject of Security and Privacy in Cloud Computing. It includes details on the exam date, marking scheme, and a comprehensive answer key for both Part A and Part B questions, covering topics such as cryptography, access control, and cloud security architecture. The exam is designed to assess students' understanding of various security measures and strategies in cloud environments.

Uploaded by

ksathishkm
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
255 views3 pages

Iii Ai & DS - CCS362 - S & PC End Semester Exam QP

The document outlines the examination structure for the B.E./B.Tech. degree in Artificial Intelligence and Data Science at M.A.M. School of Engineering, focusing on the subject of Security and Privacy in Cloud Computing. It includes details on the exam date, marking scheme, and a comprehensive answer key for both Part A and Part B questions, covering topics such as cryptography, access control, and cloud security architecture. The exam is designed to assess students' understanding of various security measures and strategies in cloud environments.

Uploaded by

ksathishkm
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

M.A.M.

SCHOOL OF ENGINEERING
(An Autonomous Institution)
Accredited by NAAC & Approved by AICTE, New Delhi
Affiliated to Anna University, Chennai
Siruganur, Trichy -621 105. www.mamse.in

B.E./B.Tech. DEGREE END SEMESTER THEORY EXAMINATIONS – APR/MAY 2025


Artificial Intelligence and Data Science
Regulation 2021

Sub.Code/Sub.Name :CCS362 / SECURITY AND PRIVACY IN CLOUD Date : 02-06-25


Year/Sem. :III /VI QP Code :
Max. Marks : 100
Answer Key
Part A (10 X 2 = 20 Marks)
M.A CO BTL
Answer All the Questions
Compare cloud security and traditional network security.
1. Answer: 2 CO1 K3

What are the five security services provided by cloud computing?


2. Answer: 2 CO1 K2

List out the data protection strategies used in the cloud.


3. Answer: 2 CO2 K1

Differentiate between data encryption and data obfuscation.


4. Answer: 2 CO2 K3

How does SSO work?


5. Answer: 2 CO3 K1

What is OS hardening? Mention one method to achieve it.


6. Answer: 2 CO3 K2

Name two types of access control mechanisms used in cloud environments


7. Answer: 2 CO4 K1

What is the goal of cloud resource access control?


8. Answer: 2 CO4 K2

9. What are some common methods to monitor and prevent malicious traffic 2 CO5 K2
in the cloud?
Answer:
Why is auditing essential for maintaining cloud security?
10. Answer: 2 CO5 K2

Part B (5 X 16 = 80 Marks)
M.A CO BTL
Answer All the Questions
What is cryptography? Explain various cryptographic techniques used
to enhance cloud security.
11. a Answer: 16 CO1 K2

(or)
Elaborate on the importance of digital signatures in cloud
environments. How do they ensure authentication and integrity?
b Answer: 16 CO1 K2

What are the different virtualization strategies in cloud security


architecture? Explain with an example
12. a Answer: 16 CO2 K2

(or)
Explain the common cloud attack vectors and threats. How can security
architecture be designed to mitigate these threats?
12. b 16 CO2 K2
Answer:

Describe Role-Based Access Control (RBAC) in detail. How is it


implemented in cloud systems? What are its advantages and limitations?
Give real-world cloud examples.
13. a 16 CO3 K2
Answer:

(or)
Explain the concepts of verified boot and measured boot. How do these
techniques enhance trust and integrity in the cloud environment?
13 b Answer: 16 CO3 K2

Describe the concept of cloud bursting. Design a scenario where cloud


bursting can be implemented effectively and justify the design.
14. a 16 CO4 K2
Answer:

(or)
Discuss the architecture and methods to achieve secure internet access
from on-premise environments connected to cloud.
14. b Answer: 16 CO4 K2

Explain the auditing process for cloud environments. What are the key
components of an effective auditing strategy?
Answer:
15 a 16 CO5 K2

(or)
Describe the role of Security Information and Event Management in
cloud security.
Answer:
15 b 16 CO5 K2

You might also like