0% found this document useful (0 votes)
35 views2 pages

Questions For Refference

Cloud computing provides on-demand access to shared computing resources like networks, servers, storage, applications and services over the internet. However, it also poses various security risks regarding data privacy, integrity and availability due to the loss of direct control over the underlying network infrastructure. Effective security measures need to be implemented at various levels from network to application to address these challenges through means like access control, encryption, auditing and identity management. Further, a shared responsibility model is required where both cloud service providers and users take measures to protect the cloud environment and ensure its secure usage.

Uploaded by

RYZEN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views2 pages

Questions For Refference

Cloud computing provides on-demand access to shared computing resources like networks, servers, storage, applications and services over the internet. However, it also poses various security risks regarding data privacy, integrity and availability due to the loss of direct control over the underlying network infrastructure. Effective security measures need to be implemented at various levels from network to application to address these challenges through means like access control, encryption, auditing and identity management. Further, a shared responsibility model is required where both cloud service providers and users take measures to protect the cloud environment and ensure its secure usage.

Uploaded by

RYZEN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Important questions from the First and Second Units

Chapter-1
1. What is Cloud Computing? Discuss the various essential characteristics of the Cloud. Discuss the
Service Model Architecture of the cloud. Briefly discuss the cloud service and deployment and
delivery models of the cloud. (4+5+7+9)
2. Discuss the various security issues and opportunities of Hypervisor. Define and elaborate on the
various types of security risks. Discuss the distinct advantages of cloud security. What are the cloud
security challenges?- Discuss them elaborately. ( 7+7+5+6)
3. Write a short note on data storage service. What is data integrity in a cloud environment? Discuss the
various features of data integrity. What are the benefits of data integrity? Discuss the various causes of
lack of trust in cloud computing. (5+5+5+5+5)
4. Discuss the multi-tenancy issues and Taxonomy of fear in a cloud environment. What are the various
threat models in the cloud? Discuss the distinct security attacks in cloud computing. Briefly discuss
the distinct cloud infrastructure level security. (8+6+5+6)
5. Define the Host and application-level Security. Discuss auditing, monitoring, and risk management in
a cloud environment. Define privacy breaches in brief. Who is responsible for protecting privacy?
What are the various security threats in a cloud? (5+6+4+4+6)
6. What is loss of control? How to minimize the lack of trust and loss of control in the cloud? Discuss the
various user authentication systems and the issues related to it. Define Non-repudiation and discuss its
various aspects and types in brief. (4+6+8+7)
7. What is access control? Briefly discuss its various aspects. What are public and private key
cryptographies? Precisely distinguish between them. State the advantages and disadvantages of them.
Briefly discuss the various key management strategies and their distinct aspects. (5+5+7+8)
8. Write short notes on the digital signature and hash function. Briefly discuss identity and access
management and its various aspects. What are the advantages of it? Define virtualization in brief and
discuss its architecture elaborately. (10+7+8)
9. Discuss the various advantages and challenges of virtualization. What are the security requirements in
virtualization? Define hypervisor vulnerabilities and the roles of hypervisor. What is a Trusted
Computing Base? What is password security? Discuss its various aspects in brief. (7+4+8+6)
10. Define Authorization and its different aspects in brief. Briefly discuss the Cloud Access Security
Broker (CASB) and its advantages. What is the key distribution? State the various strategies of it in
brief. Define the Key Distribution Center (KDC) and its workings in brief. (6+6+7+6)
11. What is multifactor authentication (MFA) and how it is conducted? Discuss the various recovery
models and backup strategies in cloud computing in brief. Define Cyber Incident Reporting and zero
trust. (8+10+7)
12. Discuss the shared responsibility model and its different aspects. What cloud security alliance? State
the various strategies of it. Discuss the architecture of the zero-trust model in brief. (7+8+10)
Chapter-2
1. Discuss the various security and privacy in cloud computing. Discuss the various security
compliance features in cloud computing. What is physical security and why it is important? Discuss
elaborately. Write a short note on cloud anxiety. Explain briefly. State the various advantages of
cloud-based physical security. (5+5+5+4+6)
2. What is disaster recovery? Discuss the various aspects and types of it in brief. What is complex
management in a cloud environment? Describe cross-functional coordination. How to create a robust
cloud strategy?- Explain elaborately the different strategies of it. Briefly explain the encryption and
tokenization in a cloud environment. (7+7+5+6)
3. Describe the various aspects and types of data center architecture. Discuss the various security
challenges of Data Centers in brief. Explain the fault tolerance in cloud computing and discuss the
different techniques for achieving it. Distinguish between public and private clouds in terms of
various security threats and risks. (5+7+6+7)
4. What is a multi-cloud environment? What are the various risks in multi-cloud environments? What
are the various approaches to secure it? Discuss the various security challenges in multi-tenant
environments. What are the various important components of the data center environmental
monitoring system? (5+4+4+5+7)
5. Discuss the intrusion detection and prevention approaches. What is access control and video
surveillance integration? Explain briefly. Explain visitor management in brief. What are cloud-based
cloud logbooks? Define NOC and SOC in brief and distinguish between them. (5+5+5+4+6)
6. What is security awareness training? Discuss the distinct aspects of it in brief. Define incident
management and its various types in brief. Define cloud asset management (CAM) and discuss its
importance. Discuss the various advantages of CAM. (5+8+6+6)
7. What are data backup and data replication? How do they help in disaster recovery? Discuss briefly
on failover architecture and various failover management software. Define IP address transparency.
Discuss elaborately various disaster recovery plans. (5+4+4+4+8)
8. Define isolation and segmentation in brief. Describe the various strategies of container isolation and
segmentation and their improvements. What is VM escape? What are the various strategies to
minimize the VM escape? What is container security and what are the benefits of it? (5+5+4+5+6)
9. How to secure a container? What are the essential components of securing a container? Define OS
security and hardening. Explain their benefits. What is a secure configuration? Briefly discuss the
various aspects of patch management and its workings. (5+5+5+5+5)
10. What is vulnerability assessment? Discuss its different types in brief. Define secure boot for
integrity validation. Discuss the distinct patterns of secure boots elaborately. Define secure storage
patterns and their different aspects. (6+4+5+5+5)
11. What is a single sign-on? Describe various aspects and working principles of Kerberos. Discuss the
various advantages and drawbacks of Kerberos. Describe the various biometric approaches for
authentication in the cloud computing environment. (4+9+6+6)
12. What is a secure shell (SSH)? Describe the working principle of SSH in brief. Define secure remote
access. Define Security Information and Event Management (SIEM) elaborately. Explain its
working principles in brief. What are the various benefits of SIEM? (4+5+4+4+4+4)

You might also like