WEEK 8 2022 Flashcards
The process of abstracting physical network hardware and resources from the network services and use cases are known as
Network Virtualization
ODIN is one of the proposed solutions towards Software Defined WSN and mobility management. As per the architecture of ODIN, which component of ODIN is placed on top of the controller
ODIN Master
(T/F)Shared pool of resources with easy configurability are important aspects of cloud computing
True
(T/F)In cloud computing, the users have specific knowledge about the exact physical location of the computing hardware with respect to the cloud services.
False
Suppose there are two organizations, A and B both of which provide cloud services. Any user can access the cloud of A free of cost whereas only employees of organization B can access the cloud of B. Also organization B has set up its cloud for only its own needs. With respect to the type of cloud infrastructure provided by A and B, which among the following is true
A: Public Cloud, B: Private Cloud
Which among the following can be considered as a potential service model for cloud computing.
a. Software as a Service
b. Database as a Service
c. Platform as a Service
All of these
Which of the following component can be considered as optional for a sensor node?
Location finding unit
(Y/N)You have bought a spreadsheet processing software in the form of a CD-ROM which you would need to install yourself on your computer to run and then manage. Is it an example of SaaS in cloud computing?
No
Suppose two persons A and B both wish to access a particular SaaS feature from a cloud service provider through their respective personal computers. Both of them log into the cloud at the same time. Then which among the following is true.
a. Neither A nor B will be able to access the services
b. A will be able to access the services but not B
c. B will be able to access the services but not A.
d. Both A and B will be able to access the services
Both A and B will be able to access the services
Along with Accounting, which among the following is an essential component of cloud service management.
Billing
Which among the following security paradigms is concerned with securing the in-transit data between the users and the cloud through the Internet.
Network Level Security
“Cloud Security ensures that _____________ users can access their data after proper ____________________”
legitimate, authentication
Which among the following should be protected with proper access control in cloud computing
a. Database access
b. Server access
c. Virtual resource access
d. All of these
All of these
(T/F)Before launching your cloud services as a product to customers, it is always a good idea to test your cloud applications on a cloud simulator first in the pre-deployment phase.
True
With respect to virtualization in cloud computing, which among the following can be considered as suitable virtualization paradigms
a. Storage virtualization
b. Hardware virtualization
c. Application virtualization
d. All of these.
All of these.