Cloud Computing Viva Question & Answer
Cloud Computing Viva Question & Answer
Cloud computing is a popular option for people and businesses for a number of reasons including
cost savings, increased productivity, speed and efficiency, performance, and security.
The Cloud computing services does not require any human administrators, user themselves are able
to provision, monitor and manage computing resources as needed.
The Computing services are generally provided over standard networks and heterogeneous devices.
Rapid elasticity:
The Computing services should have IT resources that are able to scale out and in quickly and on as
needed basis. Whenever the user require services it is provided to him and it is scale out as soon as
its requirement gets over.
Resource pooling:
The IT resource (e.g., networks, servers, storage, applications, and services) present are shared
across multiple applications and occupant in an uncommitted manner. Multiple clients are provided
service from a same physical resource.
Measured service:
The resource utilization is tracked for each application and occupant, it will provide both the user
and the resource provider with an account of what has been used. This is done for various reasons
like monitoring billing and effective use of resource.
Answer - Cloud computing makes it possible to render several services, which can be defined
according to the roles, service providers and the user companies. Cloud computing models and
services are broadly classified as below:
The Infrastructure As A Service (IAAS) means the outsourcing of the physical infrastructure of IT
(network, storage, and servers) from a third party provider. The IT resources are hosted on external
servers and users can access them via an internet connection.
The Benefits
Time and cost savings: more installation and maintenance of IT hardware in-house, Better flexibility:
On-demand hardware resources that can be tailored to your needs,
This cloud computing service model is ideal for large accounts, enterprises or organizations capable
of building and managing their own IT platforms. However, they want the flexibility to amend their
infrastructure according to their needs.
The Benefits
• Time saving and flexibility for development projects: no need to manage the implementation
of the platform, instant production.
• Data security: You control the distribution, protection, and backup of your business data.
It is ideal for companies wanting to maintain control over their business applications. However, they
wish to get rid of constraints to manage the hardware infrastructure and software environment.
SAAS: Releasing The User Experience Of Management Constraints Software as a Service (SaaS) is
provided over the internet and requires no prior installation. These services can be availed from any
part of the world at a minimal per month fee.
The Advantages
You are entirely free from the infrastructure management and aligning software environment: no
installation or software maintenance.You benefit from automatic updates with the guarantee that all
users have the same software version.It enables easy and quicker testing of new software solutions.
Public Cloud
This type of cloud services is provided on a network for public use. Customers have no control over
the location of the infrastructure. It is based on a shared cost model for all the users, or in the form
of a licensing policy such as pay per user. Public deployment models in the cloud are perfect for
organizations with growing and fluctuating demands. It is also popular among businesses of all sizes
for their web applications, webmail, and storage of non-sensitive data.
Community Cloud
It is a mutually shared model between organizations that belong to a particular community such as
banks, government organizations, or commercial enterprises. Community members generally share
similar issues of privacy, performance, and security. This type of deployment model of cloud
computing is managed and hosted internally or by a third-party vendor.
Hybrid Cloud
This model incorporates the best of both private and public clouds, but each can remain as separate
entities. Further, as part of this deployment of cloud computing model, the internal, or external
providers can provide resources. A hybrid cloud is ideal for scalability, flexibility, and security. A
perfect example of this scenario would be that of an organization who uses the private cloud to
secure their data and interacts with its customers using the public cloud.
some or an entire storage area network into one or more logical SANs to be used by internal or
external IT services and solutions. A VSAN is identified with a unique ID, which is a number, and is
also assigned a name. While creating a VSAN it is mapped to a VLAN which it will use to carry the
Fibre Channel traffic over Ethernet A virtual storage area network is primarily implemented in cloud
computing and virtualization environments. A VSAN allows end users and organizations to provision
a logical storage area network on top of the physical SAN through storage virtualization.
Q.10 What are the various cloud computing security challenges and different cloud security
services
Answer - Cloud security involves the procedures and technology that secure cloud computing
environments against both external and insider cybersecurity threats. Cloud computing, which is the
delivery of information technology services over the internet, has become a must for businesses and
governments seeking to accelerate innovation and collaboration. Cloud security and security
management best practices designed to prevent unauthorized access are required to keep data and
applications in the cloud secure from current and emerging cybersecurity threats
Cloud computing categories
Cloud security differs based on the category of cloud computing being used. There are four main
categories of cloud computing:
Public cloud services, operated by a public cloud provider — These include software-as-a-service
(SaaS), infrastructure-as-a-service (IaaS), and platform-as-a-service (PaaS).
Private cloud services, operated by a public cloud provider — These services provide a computing
environment dedicated to one customer, operated by a third party.
Private cloud services, operated by internal staff — These services are an evolution of the
traditional data center, where internal staff operates a virtual environment they control.
Hybrid cloud services — Private and public cloud computing configurations can be combined,
hosting workloads and data based on optimizing factors such as cost, security, operations and
access. Operation will involve internal staff, and optionally the public cloud provider.
2. HDFS (Hadoop Distributed File System): HDFS takes care of the storage part of Hadoop
applications. MapReduce applications consume data from HDFS. HDFS creates multiple replicas of
data blocks and distributes them on compute nodes in a cluster. This distribution enables reliable
and extremely rapid computations.
Control over cloud data — In a third-party cloud service provider’s environment, IT teams have less
access to data than when they controlled servers and applications on their own premises. Cloud
customers are given limited control by default, and access to underlying physical infrastructure is
unavailable.
Access to cloud data and applications —Users may access cloud applications and data over the
internet, making access controls based on the traditional data center network perimeter no longer
effective. User access can be from any location or device, including bring-your-own-device (BYOD)
technology. In addition, privileged access by cloud provider personnel could bypass your own
security controls.
Compliance — Use of cloud computing services adds another dimension to regulatory and internal
compliance. Your cloud environment may need to adhere to regulatory requirements such as HIPAA,
PCI and Sarbanes-Oxley, as well as requirements from internal teams, partners and customers. Cloud
provider infrastructure, as well as interfaces between in-house systems and the cloud are also
included in compliance and risk management processes.
Cloud-native breaches – Data breaches in the cloud are unlike on-premises breaches, in that data
theft often occurs using native functions of the cloud. A Cloud-native breach is a series of actions by
an adversarial actor in which they “land” their attack by exploiting errors or vulnerabilities in a cloud
deployment without using malware, “expand” their access through weakly configured or protected
interfaces to locate valuable data, and “exfiltrate” that data to their own storage location.
Misconfiguration – Cloud-native breaches often fall to a cloud customer’s responsibility for security,
which includes the configuration of the cloud service. Research shows that just 26% of companies
can currently audit their IaaS environments for configuration errors. Misconfiguration of IaaS often
acts as the front door to a Cloud-native breach, allowing the attacker to successfully land and then
move on to expand and exfiltrate data. Research also shows 99% of misconfigurations go unnoticed
in IaaS by cloud customers. Here’s an excerpt from this study showing this level of misconfiguration
disconnect:
Disaster recovery – Cybersecurity planning is needed to protect the effects of significant negative
breaches. A disaster recovery plan includes policies, procedures, and tools designed to enable the
recovery of data and allow an organization to continue operations and business.
Insider threats – A rogue employee is capable of using cloud services to expose an organization to a
cybersecurity breach. A recent McAfee Cloud Adoption and Risk Report revealed irregular activity
indicative of insider threat in 85% of organizations.
Cloud rudiments means that the services provided through cloud such as Resource aggregation and
integration: - Cloud solution integrates or aggregates the information of virtualization management,
physical server provisioning, system management.