Cloud Computing Assignment 2025
Cloud Computing Assignment 2025
A. Resource Pooling
B. Measured Service
C. Rapid Elasticity
D. Latency
.
d.
b
C
1point
2 "Google Slide" is an example of
A. PaaS
B. laaS
C. SaaS
D. FaaS
Oc.
1point
VM technology allows multiple virtual machines to run on a single physical system.
A. True
B. False
) For less data-intensive applications, horizontal scale-out elasticity is the ideal solution. 1point
A. True
B. False
b.
A. FTP
B. SNTP
C. XaaS
D. FaaS
Ob.
d.
8) 1point
What is/are the main requirement(s) of a Cloud Service Provider (CSP)?
A. Increase agility
B. Increase cost
C. Increase productivity
D. Decrease cost
C
9) PaaS (Platform as a Service) brings the benefits: (i) Creation of software (ii) Integration of web i point
services and databases
A. Only (i)
B. Only (ü)
C. Both (i) and (i1)
D. Neither (i) nor (i)
Ob.
10) 1point
A is a distributed computer system that consists of a collection of interconnected
stand-alone computers working together as an integrated computing resource.
A. Grid
B. Cluster
C. Cloud
D. Node
(©A
B
(OA
OB
Oc
OD
Yes, the answer is correct.
Score:
Accepted Answers:
A
3) Organization should consider-(i) Network Dependency and (1) Risks from multi-tenancy 1point
while thinking of deploying an outsourced private cloud.
A. Only (0)
B. Only (ü)
C. Both () and ()
D. None of () and (ü)
A
CD
Yes, the answer is correct.
Score: 1
Accepted Answers:
C
4) 1 point
Which of the following is/are XML parser API(s)?
A. Xaas (Anything as a Model)
B. DOM (Document Object Model)
C. CLI (Command Line Interface)
D. SLA (Service Level Agreement)
(B
Oc
D
A
B
A. Hypervisor
B. Short-term Scheduler
C. Analyzer
D. Parser
7) Speed and flexibility are the two disadvantages of hardware-assisted virtualization. 1point
A. True
B. False
A
B
Yes, the answer is correct.
Score: 1
Accepted Answers:
A
8) 1 point
The following problems are addressed through Web services:
A. Firewall
B. Interoperability
C. Complexity
D. Speed
A
VB
c
D
OA
B
OD
Yes, the answer is correct.
Score:
Accepted Answers:
C
Week 3:Assignment 3
The due date for submitting this assignment has passed.
Due on 2025-02-12, 23:59 IST.
a. Privacy
b. Data Retention and Deletion
c. Machine-Readable SLAs
d.Certification
b
c
d
23 Which of the following is/are true regarding penalty cost? (Here D(t) and R(t) are instantaneous 1point
demand and resources at time t.)
a TRUE
b. FALSE
4) Which of the following is/are example(s) of cloud SLA(s) with laas delivery model? 1point
a. Amazon EC2
b. Google App Engine
c. Salesforce CRM
d. Zoho mail
Oc
d
a. Keystone
b. Cinder
c. Swift
d. Neutron
6) In cloud, service downtime is 30 minutes and availability of the service is 0.80. What is the 1point
service uptime?
Oa
b
) In Google File System (GFS), the master maintains regular communication with the chunk servers. 1point
a. TRUE
b. FALSE
8) What is/ are the expected SLA parameters for Software-as-a-Service (SaaS): 1point
(a) Reliability
(b) usability
(c) Cache Memory size
(d) Customizability
10) Statement 1: In OpenStack block storage, the stored objects persist until the VM is terminated. 1point
Statement 2: In OpenStack ephemeral storage, the stored objects are accessible from within VM
as local file system.
(Oc
d
(Ob
Yes, the answer is correct.
Score:
Accepted Answers:
b
2) ipoint
Oa
d
Yes, the answer is correct.
Score:
Accepted Answers:
a
4) Which of the following components of 0penStack is responsible for providing persistent 1point
block storage to running instances
(a) Nova
(b) Cinder
(c) Swift
(d) None of the above
(a) BigQuery
(b) Google App Engine
(c) Cloud Endpoints
(d) Cloud SsQL
a
0) Which of the following is/are App Services provided Google Cloud Platform? 0 points
(a) Big Query
(b) Cloud App Engine
(c) Cloud Endpoints
(d) Cloud SQL
(Ob
(a) 1 to 50
(b) 1 to 20
(c) 1to 10
(d) 1 to 100
a
Column Column 2
(d
Yes, the answer is correct.
Score:
Accepted Answers:
d
10) In GCP. "gcloud app browse" - can be used to start the local development server for the ipoint
application.
(a) TRUE
(b) FALSE
Oa
b
OB
No, the answer is incorrect.
Score: 0
Accepted Answers:
B
2) Statement I: In resource management, resource allocation is the allocation of a service provider's 1point
resources to a customer
Statement II: Resource mapping is correspondence between resources required by the users and
resources available with the provider.
Which of the options is/are correct?
A. Statement I is TRUE and Statement Il is FALSE
B. Statement I is FALSE and Statement Il is TRUE
C. Both statements are TRUE
D. Both statements are FALSE
Oc
OD
Yes, the answer is correct.
Score:
Accepted Answers:
B
3) Athird party application runs in the cloud for 12 hours/day. At the end of one month [30 days], it 1point
was found that the cloud service suffered 5 outages of durations: 1 hour 30 minutes, 30 minutes, 2
hours 15 minutes, 1 hour 45 minutes and T hours, each on different days over the service period.
Suppose a cloud guarantees service availability for 97% of time. What are the possible value(s) of
T that SLAnegotiation gets honored in terms of service availability?
A. 3 hours
B. 6 hours
C. 12 hours
D. 8 hours
OA
OB
Oc
D
Yes, the answer is correct.
Score:
Accepted Answers:
A
4) 1point
In a MapReduce framework, the HDFS block size is 64 Mb. We have 3 files of size 65 Kb, 64 Mb
and 128 Mb. How many input splits will be created by the Hadoop framework?
A. 2
B. 3
C.4
D. 5
A
B
OD
Yes, the answer is correct.
Score:
Accepted Answers:
C
5) What is/are the correct statement(s) regarding VM load management?
A. When load increases, new VMs should be scheduled to new nodes.
B. When load decreases, use WOL to start up waiting nodes.
C. When load increases, use WOL to start up waiting nodes.
D.When load decreases, live migrate VMs to more utilized nodes.
D
Yes, the answer is correct.
Score: 1
Accepted Answers:
A
The correct statement(s) for necessary and sufficient conditions for the detection of inheritance
conflict is/are:
A. Sufficient condition: current entry role and at least one exit role forms conflicting pair
B. Sufficient condition: current entry role is senior to at least one exit role
C. Necessary condition: current entry role is senior to at least one exit role
D. Necessary condition: at least one exit role
D
Yes, the answer is correct.
Score:
1
Accepted Answers:
B
8 Which of the following part(s) of the MapReduce is responsitble for processing one or more chunks
of data and producing the output results?
A. Mapper
B. Reducer
C. Map task
D. Task execution
OD
Yes, the answer is correct.
Score: 1
Accepted Answers:
9) i point
Consider that the peak computing demand for an organization is 200 units. The demand as a
function of time can be expressed as D(t) = 3(1+t). Baseline (owned) unit cost is 120 and cloud
unit cost is 125.
Cloud is costlier than owning for a period of 150 time units.
A. TRUE
B. FALSE
2)
Which of the following is/are example(s) of passive attack? 1point
A. Replay
B. Denial of service
C. Traffic analysis
D. Masquerade
OA
OB
3) 1point
Interception is an attack on integrity
A. TRUE
B. FALSE
OB
Yes, the answer is correct.
Score: 1
Accepted Answers:
B
4) Statement I: Intrusion Detection System (IDS) scans the incoming messages, and creates alerts 1point
when suspected scans/attacks are in progress.
Statement ll: Authentication is the identification of legitimate users.
C
D
0) Recovery Time Objective (RTO) represents the period of time allowed for the complete execution 1point
of the task.
A. TRUE
B. FALSE
A
B
1 point
7 The correct statement(s) for necessary and sufficient conditions for the detection of inheritance
conflict islare:
A. Sufficient condition: current entry role and at least one exit role forms conflicting pair
B. Sufficient condition: curTent entry role is senior to at least one exit role
C. Necessary condition: curent entry role is senior to at least one exit role
D. Necessary condition: at least one exit role
VB
C
8 1point
Which of the following is/are hypervisor risks associated with VM escape?
A. Vuinerable virtual machine applications like Vmchat, VMftp, Vmcat etc.
B. Rogue hypervisor that hides itself from normal malware detection systems
C. Improper configuration of VM
D. Rogue hypervisor that creates a covert channel to dump unauthorized code
OB
Yes, the answer is correct.
Score:
Accepted Answers:
B
10) 1point
Which of the following Open-source tools is/are used for retrieving web pages in Amazon EC2
platform?
A. wget
B. hping
C. ifconfig
D. nmap
OB
Oc
OD
Od
Yes, the answer is correct.
Score: 1
Accepted Answers:
a
2) Which of the following is true about geographical information system? Choose the most 1point
appropriate option.
a) Variable load of the GIS server needs dynamic scaling of resources.
b) GIS uses network intensive web services.
c) GIS requires a high level of reliability.
d) All of these.
a
Ob
4) 1 point
Which of the following statements is false about Code offloading using cloudlet?
Statement 1: The architecture reduces latency by using multi-hop network.
Statement 2: It potentially lowers battery consumption by using short range radio.
a. Statement 1 is correct but Statement 2 is incorrect
b. Statement 2 is corect but Statement 1 is incorrect
c. Both the statements are correct
d. Both the statements are incorrect.
(b
a
b
(d
Yes, the answer is correct.
Score:
Accepted Answers:
d
6) 1point
Which of the following statement(s) is/are FALSE about Fog Computing?
a. Virtualization
b. Big data
c. Service oriented architecture
d. None of these
1point
8) Which of the following is/are feature(s) of Mobile Cloud Computing?
a) Use less mobile device resources because applications are cloud-supported
b) Reduce reliability with information backed up and stored in the cloud
c) Mobile devices connect to services delivered through an API architecture
d) Facilitates slower development, delivery and management of mobile apps
Va
Statement 1: Geospatial Cloud helps to integrate data from heterogeneous back-end data
service.
Statement 2: Data services can be inside andor outside of the cloud environment in Geospatial
Cloud.
1point
2) Virtual machines take up less space than Containers.
a. True
b. False
3) Which of the following statements is/are correct? Choose the most appropriate option. 1point
Statement 1: An image is a light weight, stand alone, executable package that includes everything
to run a piece of software.
Statement 2:Container is a run time instance of an image.
Od
Yes, the answer is correct.
Score: 1
Accepted Answers:
C
4) In loT based vehicular data clouds, vehicles providing their networking and data processing 1 point
capabilities to other vehicles through the cloud is best identified with which of the following
services?
a. SaaS
b. PaaS
c. IaaS
d. BaaS
(Ob
Yes, the answer is correct.
Score:
Accepted Answers:
b
D For sensor resources that do not have direct connection to the cloud, sensor network proxy 1 point
(a
Ob
Yes, the answer is correct.
Score:
Accepted Answers:
a
1point
8) An IoT platform has following basic building blocks
(a) Things
(b) Gateway
(c) Network and Cloud
(a) Learming Module
b
9) In the context of Green Cloud Computing, the Power Usage Effectiveness is defined as 1point
Oa
1point
10) Agreen broker can perform scheduling of applications to reduce energy consumption.
a. True
b. False
Oa
2) Which of the following is not a layer of the Cloud-Fog environment model? 1point
a. Client layer
b. Serverless layer
c. Fog layer
d. Cloud layer
Oc
Od
Yes, the answer is correct.
Score: 1
Accepted Answers:
b
3) In the Cloud-Fog environmental model, servers contain a fog server manager and virtual machines 1point
a. Image virtualization
b. Container virtualization
c. Server virtualization
d. None of these
4) The architecture used for resource management in fog/edge computing is classified on the basis of 1point
b
1point
3Which of thefollowing underlying algorithm(s) is used to facilitate fog/edge computing ?
a. Discovery
b. Load balancing
c. Benchmarking
d. Cache Flow
6) is a technique in which a server, an application and the associated data are moved Ipoint
(c
Od
Yes, the answer is correct.
Score:
Accepted Answers:
7) Cloud federation is the collaboration between cloud service providers to achieve which of the 1point
1point
8) Which of the following is false about loosely coupled federations?
a. Limited inter operations between cloud instances.
b. Usually no support for advanced features.
c. Advanced control over remote resources.
d. None of these
Oa
1 point
0) Hybrid architecture combines the existing on-premise infrastructure (usually a private cloud) with
remote resources from one or more public clouds to provide extra capacity to satisfy peak demand
periods.
a. True
b. False
(Oa
Ob.
Yes, the answer is correct.
Score: 1
Accepted Answers:
a
2) Given the VM memory size of 1024GB and the transmission rate of 16 MB/sec 1point
What are the total migration time and downtime for non-live VM migration? Choose the most
appropriate option.
a. 20 hours, 25 hours
b. 18 hours, 18 hours
C. 16 hours, 16 hours
d. 24 hours, 20 hours
a
) With Docker, the resource management effort is separated from the configuration effort. 1point
a. True
b. False
(a
b
4) In Docker utility, is a collection of filesystem layers and some metadata which, if 1point
taken together, can be spun up as Docker containers.
a. Operating System
b. Microservice
c. Virtual Machine
d. Image
Ob
1point
8) Which of the following is (are) true in the case of Docker architecture?
Statement-1: Private Docker registry is a service that stores Docker images.
Statement-2: Docker on the host machine is split into two parts- a daemon with a RESTful API and
a client who talks with the daemon.
Oc
d
Yes, the answer is correct.
Score:
Accepted Answers:
b
Oa
a. Serverless computing allows the users with more control over the deployment environment
compared to PaaS.
b. Serverless computing is a form of cloud computing that allows users to run event driven
granular applications.
(a
b
Statement 1: Each function in the FaaS platform gets unlimited execution time.
Statement 2: Functions are always active and ready for execution.
a. Statement 1 is correct but Statement 2 is incorect.
b. Statement 2 is correct but Statement 1 is incorrect.
C. Both the statements are correct.
d. Both the statements are incorrect.
a
Ob
3) AWs s3 is a fully managed proprietary NoSQL database service that supports key-value and 1point
document data structures and is offered by Amazon.com as part of the Amazon Web Services
portfolio.
a. True
b. False
b. Google
c. Microsoft
d. IBM
(Ob
Ob
Yes, the answer is correct.
Score: 1
Accepted Answers:
b
6) In serverless computing the user has to manage the scalability needs of a function, unlike FaaS. 1point
a. True
b. False
) Which of the following is/are the goal of sustainable cloud computing? Choose the most i point
appropriate option.
a. Minimizing the energy consumption.
b. Increasing reliability of CDCs.
c. Minimizing carbon footprint related cost.
d. Increasing network traffic
8) Which of the following is not a category of research initiative on sustainable cloud computing? 1point
a. Renewable Energy
b. Capacity planning
c. Environment Sandboxing
d. None of these
a. True
b. False
Oa
10) 1point
are an important distribution mechanism for libraries and custom runtimes in AWS
serverless ecosystem.
a. Runtimes
b. Lambda Layers
c. Log streams
d. None of these
(b
a. Reliability improvement
b. Sharing of resources
c. Offloading data processing
d. Mitigating network traffic congestion
2) Cyber-physical system is all about of the physical and the cyber. 1point
a. Union
b. Intersection
c. Segregation
d. None of above
3) Cloud computing services provide a flexible platform for realizing the goals of Cyber-Physical 1point
systems.
a. True
b. False
a. Modular composition
b. Multi-Tenancy
c. Data flow
d
5) A is a trace generated by a moving object in geographical space, usually represented by 1point
6)
Limitation(s) of loT devices is(are) i point
a. Containerization
b. Storage
C Processing
d. Power requirement
C
d
7) 1point
Which of the statements is(are) true with respect to Spatial cloud
Statement 1: It does not support shared resource pooling which is useful for participating
organizations with common or shared goals
Statement 2: Spatial cloud provides infrastructure requirement that is based on application, with
nothing to purchase. This leverages the scalability of the application.
8) Customized wearable devices for collecting health parameters are the best examples of 1point
a. IoHT
b. Fog device
c. Fog-Cloud interfaced.
d. Cloud-Fog-Edge-IoHT
a
a. True
b. False
10) ipoint
5G netwok technology has proven to offer a theoretical download speed of 1Gbit's.
a. True
b. False