You are on page 1of 6

CLOUD COMPUTING

2-MARKS
1. What is service mashups?
 A mash-up (sometimes spelled as one word, mashup) is a Web page or application that
integrates complementary elements from two or more sources.An enterprise mash-up
typically combines internal corporate data and applications with externally sourced data,
SaaS (software as a service) and Web content.

2. What is Utility Computing?


 Utility computing, or The Computer Utility, is a service provisioning model in which a
service provider makes computing resources and infrastructure management available to the
customer as needed, and charges them for specific usage rather than a flat rate.

3. Define PaaS.
 Platform as a service (PaaS) is a cloud computing model in which a third-party provider
delivers hardware and software tools -- usually those needed for application development --
to users over the internet. A PaaS provider hosts the hardware and software on its own
infrastructure. As a result, PaaS frees users from having to install in-house hardware and
software to develop or run a new application.

4. What are deployement models of Cloud Computing?


 A cloud deployment model represents a specific type of cloud environment, primarily
distinguished by ownership, size, and access.
There are four common cloud deployment models:
Public Clouds
Community Clouds
Private Clouds
Hybrid Clouds

5. Write short note on security and privacy in cloud computing.


 The Privacy Implications of Cloud Computing. ... In cloud computing, the term refers
generally to any computer network or system through which personal information is
transmitted, processed, and stored, and over which individuals have little direct knowledge,
involvement, or control.
 Cloud computing security or, more simply, cloud security refers to a broad set of policies,
technologies, applications, and controls utilized to protect virtualized IP, data, applications,
services, and the associated infrastructure of cloud computing.

6. Write briefly about amazon web service.


 Amazon Web Services (AWS) offers a broad set of global compute, storage, database,
analytics, application, and deployment services that help organizations move faster, lower IT
costs, and scale applications.

7. What is IaaS workloads?


 IaaS is an effective model for workloads that are temporary, experimental or that change
unexpectedly. ... In general, IaaS customers pay on a per use basis, typically by the hour,
week or month. Some IaaS providers also charge customers based on the amount of virtual
machine space they use.

8. Define SOA.
 The Service Oriented Architecture is an architectural design which includes collection of
services in a network which communicate with each other. The complication of each service
is not noticeable to other service.
 Service-oriented architecture (SOA) is a style of software design where services are
provided to the other components by application components, through a communication
protocol over a network.

9. What is IDaas Interoperability?


 IDaaS is an extremely broad term, including services for software, platform and
infrastructure services in both the private and public cloud. ... In the first definition, IDaaS
refers to managed identity services (MIS) in which a managed service provider (MSP)
provides on- or off-site services to customers.

10. What is SAML?


 The Security Assertion Markup Language (SAML) is an open standard for sharing
security information about identity, authentication and authorization across different systems.
SAML is implemented with the Extensible Markup Language (XML) standard for sharing
data, and SAML provides a framework for implementing single sign-on (SSO) and other
federated identity systems.
The SAML protocol is managed by the Organization for the Advancement of Structured
Information Standards (OASIS), which wrote that "SAML allows business entities to make
assertions regarding the identity, attributes, and entitlements of a subject (an entity that is
often a human user) to other entities, such as a partner company or another enterprise
application."

11. What is Authorization markup languages?


 Security Assertion Markup Language (SAML, pronounced sam-el) is an open standard
for exchanging authentication and authorization data between parties, in particular,
between an identity provider and a service provider. ... SAML is also: A set of XML-based
protocol messages. A set of protocol message bindings.

12. What is XACML?


 XACML (Extensible Access Control Markup Language) is an open standard XML-based
language designed to express security policies and access rights to information for Web
services, digital rights management (DRM), and enterprise security applications.

13. What is virtualization and load balancing?


 A Virtual Load Balancer provides more flexibility to balance the workload of a server by
distributing traffic across multiple network servers. Virtual load balancing aims to mimic
software-driven infrastructure through virtualization. It runs the software of a physical load
balancing appliance on a virtual machine.

14. What is VMFS?


 VMware Virtual Machine File System (VMware VMFS) is a virtual machine file system
used in VMware ESX Server software to store files in a virtualized environment. ... Its
storage capacity can be increased by spanning multiple VMFS.

15. Write short note on Amazon Machine Image.


 An Amazon Machine Image (AMI) is a master image for the creation of virtual servers
(known as EC2 instances) in the Amazon Web Services (AWS) environment.
The machine images are like templates that are configured with an operating system and
other software, which determine the user’s operating environment. AMI types are categorized
according to region, operating system, system architecture (32- or 64-bit), launch permissions
and whether they are backed by Amazon EBS or backed by the instance store

16. Short note on Porting applications.


 Cloud portability is the ability to move applications and data from one cloud
computing environment to another with minimal disruption. Cloud portability enables the
migration of cloud services from one cloud provider to another or between a public cloud
and a private cloud.

17. What is Virtual machine provisioning?


 Virtual provisioning is a virtual storage network (VSAN)-based technology in which
storage space is allocated on demand to devices. This process allows virtualized
environments to control the allocation and management of physical disk storage connected
with virtual machines (VM).

18. Write about Virtual machine Migration?


 Virtual machine migration is the task of moving a virtual machine from one physical
hardware environment to another. It is part of managing hardware virtualization systems and
is something that providers look at as they offer virtualization services.

19. What is FCAPS?


 FCAPS is a network management framework created by the International Organization for
Standardization (ISO).
FCAPS categorizes the working objectives of network management into five levels. The five
levels are: fault-management (F), the configuration level (C), the accounting level (A), the
performance level (P) and the security level (S).

20. List out some cloud management products.


 Wrike.
 IBM Cloud Orchestrator.
 Apache CloudStack.
 Symantec Web and Cloud Security.
 ManageEngine Applications Manager.
 AppFormix.
 ServiceNow Cloud Management.
 OpenStack.

21. Write about DMTF cloud management standard.


 DMTF Cloud Management Standards. Technologies like cloud computing and
virtualization have been embraced by enterprise IT managers seeking to better deliver
services to their customers, lower IT costs and improve operational efficiencies.

22. What is Brokered cloud storage access?


 Brokered Cloud Storage Access is one of the approaches for isolating storage in cloud.
In this approach, two services are created:
 A broker with full access to storage but no access to client.
 A proxy with no access to storage but access to both client and broker

23. What is Auditing and Compliance?


 Cloud Audit is a specification for the presentation of information about how a cloud
computing service provider addresses control frameworks. The goal of CloudAudit is to
provide cloud service providers with a way to make their performance and security data
readily available for potential customers.
 Cloud compliance is an issue for anyone using cloud storage or backup services. ... By
moving data from your internal storage to someone else's you are forced to examine closely
how that data will be kept so that you remain compliant with laws and industry regulations.

24. What is Identity protocol standards?


 Numerous open standard identity protocols have been introduced in the last two
decades. Amongst all, three standard identity protocols Security Assertion Markup
Language (SAML), Open Authentication (OAuth), and OpenID Connect (OIDC) are the
most established protocols in the cloud computing industry.
25. What is presence?
 Presence leveraging refers to any technology that supports and expands presence, the
ability of a network subscriber to locate and identify any other user's computing device as
soon as the other user connects to the network.

You might also like