0% found this document useful (0 votes)
16 views

Priyanka CSS

Uploaded by

Sanskar Rangole
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

Priyanka CSS

Uploaded by

Sanskar Rangole
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

1.

Define Cloud Computing

2. List types of Virtualization

3. Define Cloud Virtual Machine

4. Enlist Feature of Virtualization

5. Define Edge Computing

6. State advantages of Containerization

7. Enlist Cloud Storage Providers.

8. Define Cloud Computing.

9. List technologies used in Virtualization.

10. List key components of cloud storage architecture.

11. Define Hypervisor.

12. Define containerization.

13. State different DevOps principles.

14. Define Cloud IAM.

15. Enlist Cloud Service Models(Any Two)

16. Define virtualization in cloud computing.

17. Define cloud virtual machine

18. State advantages and disadvantages of virtualization (Any Two)


19. Enlist principles of DevOps (Any Four)

20. State benefits of edge computing.

21. Define Cloud databases

3MARks

22. Differentiate between AWS and Microsoft Azure.

23. Draw and explain Cloud database architecture.

24. State advantages and disadvantages of Virtualization.

25. Explain cloud security architecture.

26. Explain cloud network security threats.

27. Differentiate lass and Pass

28. Differentiate between PaaS and SaaS.

29. Explain characteristics of Virtualized Environment.

30. Explain which factors are consider to configuring cloud virtual machine.

31. Describe different types of cloud application security control.

32. Differentiate between Serverless Computing and Cloud Computing.

4 Marks And 6marks

33. How cloud identity and access management policies are important in cloud explain in detail.

34. Write steps to build virtual machine using VMware

35. Explain components of cloud security architecture.


36. Explain cloud network security threats (Any Three)
37. Explain characteristics of cloud computing.

38. Distinguish between VMware and Microsoft Hyper- V

39. Explain cloud storage models in detail

40. What is data classification in cloud.

41. Define RESTful API's with their characteristics.


42. Describe cloud computing architecture with suitable diagram.

43. Identify and explain factors considered while configuring cloud virtual machine.

44. Explain cloud storage architecture with diagram.

45. Describe different types of cloud application security controls.

46. Compare Edge computing and cloud computing.


47. Explain Cloud service Models

48. How service models are work in cloud database

49. Differentiate between Full Virtualization and Para Virtualization.


50. Write Short Note on:

i) Cloud data backup.

ii) Cloud data recovery

51. Explain network security threats in cloud.


52. Draw and explain cloud computing architecture
53. Explain Feature of virtualization

54. Explain the key aspects of cloud service management

55. Explain different types of cloud application security controls.

56. Compare cloud and edge computing


57. Explain characteristics of cloud computing.

58. Distinguish between VMware and Microsoft Hyper- V

59. Explain cloud storage models in detail

60. What is data classification in cloud.

61. Define RESTful API's with their characteristics.

62. Describe cloud computing architecture with suitable diagram.

63. Identify and explain factors considered while

64. configuring cloud virtual machine. Explain cloud storage architecture with diagram.

65. Describe different types of cloud application security controls.

66. Compare Edge computing and cloud computing.

67. List and explain the key aspects of cloud service management

68. Explain types of virtualization in detail(any 4)


69. Explain cloud data backup and recovery.

70. Define containerization and how it is different from virtualization

71. How data classification and protection takes place in cloud computing explain in detail

72. How do any one securely design VMware infrastructure in any datacenter

73. What should enterprises look for when evaluating DDoS attack protection solutions.

74. Describe cloud APIs and explain the role of cloud

75. APIs in cloud computing.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy