M.A.M.
SCHOOL OF ENGINEERING
(An Autonomous Institution)
Accredited by NAAC & Approved by AICTE, New Delhi
Affiliated to Anna University, Chennai
Siruganur, Trichy -621 105. www.mamse.in
B.E./B.Tech. DEGREE END SEMESTER THEORY EXAMINATIONS – APR/MAY 2025
Artificial Intelligence and Data Science
Regulation 2021
Sub.Code/Sub.Name :CCS362 / SECURITY AND PRIVACY IN CLOUD Date : 02-06-25
Year/Sem. :III /VI QP Code :
Max. Marks : 100
Answer Key
Part A (10 X 2 = 20 Marks)
M.A CO BTL
Answer All the Questions
Compare cloud security and traditional network security.
1. Answer: 2 CO1 K3
What are the five security services provided by cloud computing?
2. Answer: 2 CO1 K2
List out the data protection strategies used in the cloud.
3. Answer: 2 CO2 K1
Differentiate between data encryption and data obfuscation.
4. Answer: 2 CO2 K3
How does SSO work?
5. Answer: 2 CO3 K1
What is OS hardening? Mention one method to achieve it.
6. Answer: 2 CO3 K2
Name two types of access control mechanisms used in cloud environments
7. Answer: 2 CO4 K1
What is the goal of cloud resource access control?
8. Answer: 2 CO4 K2
9. What are some common methods to monitor and prevent malicious traffic 2 CO5 K2
in the cloud?
Answer:
Why is auditing essential for maintaining cloud security?
10. Answer: 2 CO5 K2
Part B (5 X 16 = 80 Marks)
M.A CO BTL
Answer All the Questions
What is cryptography? Explain various cryptographic techniques used
to enhance cloud security.
11. a Answer: 16 CO1 K2
(or)
Elaborate on the importance of digital signatures in cloud
environments. How do they ensure authentication and integrity?
b Answer: 16 CO1 K2
What are the different virtualization strategies in cloud security
architecture? Explain with an example
12. a Answer: 16 CO2 K2
(or)
Explain the common cloud attack vectors and threats. How can security
architecture be designed to mitigate these threats?
12. b 16 CO2 K2
Answer:
Describe Role-Based Access Control (RBAC) in detail. How is it
implemented in cloud systems? What are its advantages and limitations?
Give real-world cloud examples.
13. a 16 CO3 K2
Answer:
(or)
Explain the concepts of verified boot and measured boot. How do these
techniques enhance trust and integrity in the cloud environment?
13 b Answer: 16 CO3 K2
Describe the concept of cloud bursting. Design a scenario where cloud
bursting can be implemented effectively and justify the design.
14. a 16 CO4 K2
Answer:
(or)
Discuss the architecture and methods to achieve secure internet access
from on-premise environments connected to cloud.
14. b Answer: 16 CO4 K2
Explain the auditing process for cloud environments. What are the key
components of an effective auditing strategy?
Answer:
15 a 16 CO5 K2
(or)
Describe the role of Security Information and Event Management in
cloud security.
Answer:
15 b 16 CO5 K2