(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
Cs6703 grid and cloud computing unit 5 questions
1. Dr Gnanasekaran Thangavel, Professor and Head, RMK College of Engineering and Technology, Chennai
Page1
CS6703 GRID AND CLOUD COMPUTING
Regulation 2013
SAMPLE QUESTIONS
UNIT V SECURITY
2 MARKS
1. Define trust.
2. What is the security condition?
3. List the challenges in building trust environment.
4. What is generalized trust model?
5. What is Behavior based trust model?
6. What is Reputation-Based trust Model?
7. What is Fuzzy-Trust Model?
8. Define CA?
9. What is subordinate CA?
10.What is certificate database?
11.What is certificate store?
12.What are the types of authorization?
13.Define Authentication and Authorization.
14.What are the three authorization models?
15.What is TLS?
16.What is meant by Transport level security?
17.What are the types of message level security?
18.What is Identity security?
19.What is Information security?
20.What is Integrity of data?
21.Define Provenance?
22.What is Data remanence?
23.Define Data Remanence.
24.How to remove residual data?
25.What is IAM?
26.What are the functions of Identity and Access Management?
27.List down the layers of IAM architecture.
28.List down the elements of the IAM automation methods.
29.List the components in LAM architecture provider?
30.What is Resources Engine (RE)?
31.What is policy Decision-making (PD)?
32.What are the important tasks in the management of identities in the cloud?
33.List the Challenges in Identity Provisioning.
34.Define credential management.
2. Dr Gnanasekaran Thangavel, Professor and Head, RMK College of Engineering and Technology, Chennai
Page2
35.What is strong authentication?
36.What is federation?
37.What are the roles in federation?
38.What is federation gateway?
39.Define user profile.
40.What is privacy in cloud?
41.What is privacy by design?
42.Define Public key infrastructure.
43.What is meant by Kerberos?
44.What are the key components of Kerberos authentication system?
45.Define GSI.
46.What are the functions of GSI?
47.What are the levels of Cloud Infrastructure Security?
48.What is meant by Prefix Hijacking?
49.Define Denial of service?
50.What are the host security threats in public Iaas?
51.What is meant by application level Dos Attacks?
52.List down the aspects of data security.
53.What is meant by Data Lineage?
54.Define Data Provisioning.
8 MARKS
1. Discuss the Cloud Infrastructure Security at host and application level.
2. Explain provider data and security.
16 MARKS
3. Explain briefly the authentication and authorization methods.
4. What are the various authorization and authorization methods in grid?
5. Describe the grid security infrastructure.
6. Explain the cloud security infrastructure.
7. Discuss in detail about the Grid Security Infrastructure.
8. Explain the concepts of aspects of data security
9. Discuss briefly about the architecture of IAM.
10.Describe IAM architecture.
11.Explain IAM practices in cloud.
12.Explain the various trust models in grid.
13.Explain cloud privacy and privacy by design.