0% found this document useful (0 votes)
30 views40 pages

Cloud Computing - CS 802 (B) Lab Manual Student Copy - Edited

The document is a lab manual for the Cloud Computing course at Mahakal Institute of Technology and Management, detailing various experiments related to cloud technologies. It includes objectives, problem definitions, required setups, and expected viva questions for each experiment. The manual covers topics such as Google Drive, cloud applications, virtualization, Hadoop, Python, Google App Engine, and Microsoft Azure.

Uploaded by

nigamshruti018
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views40 pages

Cloud Computing - CS 802 (B) Lab Manual Student Copy - Edited

The document is a lab manual for the Cloud Computing course at Mahakal Institute of Technology and Management, detailing various experiments related to cloud technologies. It includes objectives, problem definitions, required setups, and expected viva questions for each experiment. The manual covers topics such as Google Drive, cloud applications, virtualization, Hadoop, Python, Google App Engine, and Microsoft Azure.

Uploaded by

nigamshruti018
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

MAHAKAL INSTITUTE OF TECHNOLOGY AND

MANAGEMENT , UJJAIN

Approved By: All India Council of Technical Education (New Delhi)

DEPARTMENT OF
COMPUTER SCIENCE AND ENGINEERING

LAB MANUAL

Name of Student: …………………..

Name of Lab : CLOUD COMPUTING

Subject Code : CS-802(B)

Branch : Computer Science and Engineering

Year/Sem : CSE/VIII

Affiliated to Rajiv Gandhi Prodyogiki Vishwavidyalaya, Bhopal (MP)


INDEX
S. No. Name of Experiment Date Sign Remark

1. Working of Google Drive to make spreadsheet and notes.

2. Case studies: Cloud Application in various fields

3. Launching of VM (Virtual Machine) on Windows (Host


Operating System) using VMware (hypervisor).
4. Study of Cloud Computing Service Models.

5. Brief Study of basic terminologies of Hadoop.

6. Installation of Hadoop on Windows operating system.

7. Python 2.7.3: Download Installation and Testing.


8. A Brief Study of Google App Engine SDK for Python and
Google App Engine Launcher.
9. The Google App Engine SDK for Python: Installation and
Testing.
10. Working and installation of Microsoft Azure.
11. Working with Mangrasoft Aneka Software.

12. Study of Cloud Security Management.

of
Experiment
EXPERIMENT NO. 1
Unit/Topic: 1/Applications of Cloud
PROBLEM DEFINITION:
Working of Google Drive to make spreadsheet and notes.

OBJECTIVE:
To understand the Working of Google Drive to prepare documents.

REQUIREMENT:

Google account, Internet Connection.

THEORY:
Theory attached here.

INPUT SET:

OUTPUT SET:

EXPECTED VIVA QUESTIONS:

Q.1 What essential things a user should know before going for cloud computing platform?

Q.2 How does cloud computing provides on-demand functionality?

Q.3 What is the difference between scalability and elasticity?

NAME OF FACULTY:
SIGNATURE:
DATE:
EXPERIMENT NO. 2
Unit/Topic: 1/Cloud Applications
PROBLEM DEFINITION:
Case studies: Cloud Application in various fields

OBJECTIVE:
To understand the uses of Cloud Computing in Various Domain.

THEORY: Theory attached here.


Home refrigerator is designed with the ability to communicate with consumer’ goods monitoring
app’ hosted on the cloud. In turn this app communicates with a supermarket (e.g. Walmart) app,
such as supermarket ‘inventory app’ which checks for the status of inventory. Supermarket ‘order
app’ on cloud sends an email or SMS to the consumer based on supermarket stock/inventory status
suggesting items finishing in the consumer’s refrigerator to buy so that they can be shipped at the
door. This workflow can be further personalized by the supermarket’s ability to weave additional
intelligent marketing campaigns based on consumer consumption pattern of vegetables, fruits, etc.
suggesting items with discounts by giving offers, targeting customer to advertise supermarket’s
own products similar to the branded ones that they often buy, etc .

Following Taxonomy also depict some cloud applications in various fields


Some Other Popular cloud applications also listed here:
• Apple Mobile Me (http://www.me.com/) This service synchronizes emails, photos, and contacts
among multiple devices. Your computer, laptop, and mobile devices can remain in sync as long as
they have access to Apple’s cloud servers.
• Google Docs (http://docs.google.com/) providing an intuitive interface, Google Docs provides
applications that you normally associate with the desktop—a word processor, spreadsheet, and
presentation designer. Documents can be saved to the cloud or locally. Multiple users can
collaborate on the same document from different computers with changes taking effect instantly.
• Adobe Acrobat (http://www.acrobat.com/) Known for its free PDF reader (among other tools),
Adobe provides its own online word processor and cloud storage space for your documents. It also
includes collaboration tools and an online PDF converter.
• Jooce (http://www.jooce.com/) Jooce is a Flash-based desktop environment, mostly for users of
Internet cafés. Dragging a file onto the desktop uploads it to the cloud, giving you access to your
files from any Internet-connected computer.
• Evernote (http://www.evernote.com/) Evernote allows you to save photos, screenshots, or files to
their servers in the cloud. If the images contain text, they are scanned and indexed to create a virtual
database. Various client software packages allow PCs, Macs, iPhones, and other endpoints to
synchronize Evernote data with the cloud.
• Microsoft Live Search (http://www.live.com/) Microsoft’s mobile phone search engine uses heavy
cloud processing to bring detailed searches to handheld devices.
• Twitterfone (http://www.twitterfone.com/) Twitterfone uses speech recognition in the cloud to
transcribe voice messages into “tweets” on the Twitter social network.
• Blist/Socrata (http://www.socratablist.com/) Blist, now called Socrata, is a database with an eye-
catching interface, how-to videos, and a drag-and-drop design. After it’s been created, the database
can be shared with other users of the site.
• Picnik (http://www.picnik.com/) This service provides photo editing in the cloud. You upload
pictures from your local machine or import them from another site—like Flickr or Facebook. The
site has powerful photo editing tools and it is also possible to add text, shapes, or a frame to your
photos.
• Adobe Photoshop Express (http://www.photoshop.com/express) This is another editor by the
creators of the powerful Photoshop application. You can store your photos on the cloud and edit
them with the same tools that you would use with a desktop version of Photoshop. Once your photo
editing is done, you can add your photos to the site’s gallery.
• G.ho.st (http://g.ho.st/) Standing for Global Hosted Operating System, G.ho.st is a Flash-based
virtual operating system. The site has the feel of a computer desktop and offers up to 5GB of free
storage (you can earn more storage space by referring others to the site) and 3GB for email, web,
and office applications (they use one named Zoho).

EXPECTED VIVA QUESTIONS:

Q.1 How does cloud computing provides on-demand functionality?


Q.2 what is the difference between scalability and elasticity?
Q.3Briefly explains uses of cloud in various fields?

NAME OF FACULTY:
SIGNATURE:
DATE:
EXPERIMENT NO. 3
Unit/Topic: 3/Virtualization
PROBLEM DEFINITION:
Launching of VM (Virtual Machine) on Windows (Host Operating System) using VMware
(hypervisor).

OBJECTIVE:
To understand the concept of Virtualization and VMWare software.

PREREQUISITES/REQUIRED SETUPS:
VMware-player-6.0.0-1295980(hypervisor)
ubuntu-10.04.1-desktop-i386 (Image of Guest Operating System i.e. ISO file)
Steps:
1. Install VMware Player
2. Once you have installed VMware Player and downloaded Ubuntu, you’re ready to setup
Ubuntu. Open VMware Player, and choose “Create a New Virtual Machine.”
3. Install Ubuntu directly from the ISO file.
4. VMware will continue installing Ubuntu even while the tools are downloading. Once the install
is finished, you will be presented with your Ubuntu login screen.

INPUT SET:

OUTPUT SET:

EXPECTED VIVA QUESTIONS:

Q.1 What is the requirement of virtualization platforms in implementing cloud?


Q.2 What is the use of eucalyptus in cloud computing environment?
Q.3 What is Hypervisor in Cloud Computing and its types?

NAME OF FACULTY:
SIGNATURE:
DATE:
EXPERIMENT NO. 4
Unit/Topic: 2/Cloud Service Models
PROBLEM DEFINITION:
Study of Cloud Computing Service Models.
OBJECTIVE:
To understand the concept of Different Service models of cloud .

THEORY:
Theory attached here.

EXPECTED VIVA QUESTIONS:

Q.1 What are the different layers of cloud computing?


Q.2 How important is platform as a service?
Q.3 What resources are provided by infrastructure as a service?

NAME OF FACULTY:
SIGNATURE:
DATE:
EXPERIMENT NO. 5
Unit/Topic: 4/Hadoop
PROBLEM DEFINITION:
Brief Study of basic terminologies of Hadoop.

OBJECTIVE:
To understand the concept of Hadoop Technology.

THEORY: Theory attached here.

EXPECTED VIVA QUESTIONS:

Q.1 What do you understand by Map Reduce?


Q.2 Explain how map reduce works?
Q.3 How does fault tolerance work in map reduce?

NAME OF FACULTY:
SIGNATURE:
DATE:
EXPERIMENT NO. 6
Unit/Topic: 4/Hadoop
PROBLEM DEFINITION:
Installation of Hadoop on Windows 7 operating system.

OBJECTIVE:
To Learn Installation of Hadoop .

PREREQUISITES/REQUIRED SETUPS:
jdk-6u31-windows-i586
hadoop-2.3.0
Hadoop-2.3-Config-master
npp.6.5.Installer

STEPS:

1. Put all setups in C Drive


2. Run the setup jdk-6u31-windows-i586 as by setting path C:\Java
3. (a) Open Hadoop-2.3-Config-master
(b) Open bin folder
4. (a) Open Hadoop-2.3.0
(b) Open bin folder

5. Replace the file yarn (hadoop-2.3.0) with the file yarn (Hadoop-2.3-Config-master)
6. (a) Open Hadoop-2.3-Config-master
(b) Open etc folder
7. (a) Open Hadoop-2.3.0
(b) Open etc folder
8. Replace folder hadoop (hadoop-2.3.0) with folder hadoop (Hadoop-2.3-Config-master)
9. Open Control panel → system-→advance system setting
10. The system Properties window will open.
11. Click on advanced Tab→Environment Variables tab

12. Set the New User Variable as shown below

13. System variable Path Edit as shown below


(a) Set for bin folder of hadoop

(a) Set for bin folder of java

14. Set the New User Variable as shown below

15. Run the command as

16. Open the file for editing as shown in the screen shot below:
16. Edit this file as shown below screen.

17. Save this file.

18. Run the command as follows & take the different screen shots running.
INPUT SET:

OUTPUT SET:

EXPECTED VIVA QUESTIONS:

Q.1 Name the platforms which are used for large-scale cloud computing.
Q.2 Why API’s are used in cloud services?
Q.3 Name some of the cloud computing platform databases?

NAME OF FACULTY:
SIGNATURE:
DATE:
EXPERIMENT NO. 7
Unit/Topic:4/cloud using python
PROBLEM DEFINITION:
Python 2.7.3: Download Installation and Testing.

OBJECTIVE:
To understand the concept of Python language and its applications.

STEPS:
Download

Download the file python-2.7.3.msi

Installation

Install file with instructions

Testing

We can test whether Python is installed on system and check which version is installed by running
the following command at a command prompt.
python -V
(That’s a capital “V.”) If Python is installed, it prints its version number, like so:
Python 2.7.3

INPUT SET:

OUTPUT SET:

EXPECTED VIVA QUESTIONS:

Q.1 Name some of the features of Python.


Q.2 What are the supported data types in Python?
Q.3 What is the difference between tuples and lists in Python?

NAME OF FACULTY:
SIGNATURE:
DATE:
EXPERIMENT NO. 8
Unit/Topic: 5/Google App Engine
PROBLEM DEFINITION:
A Brief Study of Google App Engine SDK for Python and Google App Engine Launcher.

OBJECTIVE:
To understand Different Apps using Python.

THEORY: Theory attached here.

EXPECTED VIVA QUESTIONS:

Q.1 What is the difference between deep and shallow copy?


Q.2 Discuss the Django architecture.
Q.3 What is the difference between NumPy and SciPy?

NAME OF FACULTY:
SIGNATURE:
DATE:
EXPERIMENT NO. 9
Unit/Topic: 5/Uses Of Google App Engine
PROBLEM DEFINITION:
The Google App Engine SDK for Python: Installation and Testing.

OBJECTIVE:
To understand Installation and testing of App using Python.

STEPS:
Installation: the Google App Engine SDK for Python

For Windows, the Python SDK is an .msi (Microsoft Installer) file.


We have downloaded the App Engine Python SDK bundle our operating system from the Google
App Engine website link.
http://googleappengine.googlecode.com/files/GoogleAppEngine-1.7.2.msi
This installs the Google App Engine Launcher application, adds an icon to Start menu, and adds the
command-line tools to the command path.
Testing: Google App Engine SDK for Python
Our command prompt looks like:

To test that the App Engine Python SDK is installed, run the following command at a command
prompt:

The command prints a helpful message and exits.


Google App Engine applications
Google App Engine applications can be written in the Python 2.7, Java, Go or PHP programming
languages, we use Python 2.7.
Application code written for the Python environment must be written exclusively in Python.
We build web applications using the Python programming language, and take advantage of the
many libraries, tools and frameworks for Python that professional developers use to build world-
class web applications.
App Engine executes Python application code using a pre-loaded Python interpreter in a safe
"sandboxed" environment. Our app receives web requests, performs work, and sends responses by
interacting with this environment.
The Python Development Server
The App Engine Python SDK includes a web server application you can run on your computer that
simulates your application running in the App Engine Python runtime environment.
Once you have a directory for your application and an app.yaml configuration file, you can start the
development web server with the dev_appserver.py command:
The web server listens on port 8080 by default. We visit the application at this URL:
http://localhost:8080/.
The Python runtime environment
With App Engine's Python runtime environment, we can implement our app using the Python
programming language, and run it on an optimized Python interpreter.
App Engine includes rich APIs and tools for Python web application development, including a
feature rich data modeling API, an easy-to-use web application framework, and tools for managing
and accessing your app's data.

INPUT SET:

OUTPUT SET:

EXPECTED VIVA QUESTIONS:

Q.1 What is Google Cloud Platform?


Q.2 What are the various components of the Google Cloud Platform?
Q.3 What do you know about Google Compute Engine?

NAME OF FACULTY:
SIGNATURE:
DATE:
EXPERIMENT NO. 10
Unit/Topic: 5/Microsoft Azure
PROBLEM DEFINITION:
Working and installation of Microsoft Azure.

OBJECTIVE:
To learn How to install Microsoft Azure and its working.

REQUIREMENT:
Account on Microsoft Azure

THEORY:
Theory attached here.

Let us see how to create the stored procedure in Azure portal step by step.

Steps:
Log in to the Azure portal using the below link. You can see the screen look similar to below

http://www.microsoft.com/windowsazure/

Login to the portal using your Microsoft Windows Live credentials with Azure credentials to the
management portal and you will see the screen as shown in the screen below
Now we can see the Database Menu at the bottom left, Click on that will go to the Database
Subscription window as shown in the screen below

Clicking on the subscription name will provide the complete details of the server created and the
new database created as shown in the screen below
Now we have a database created (LearnAzure) with a Max size of 1GB and ready to use it for the
application based on the requirement. To create a new Stored Procedure click on Manage at the top
menu tool bar as shown in the screen below

Check my previous article on how to connect to the manage portal using the credentials and the
firewall using the link. Once logged in you screen will look like below
To create a new stored procedure click on New Stored procedure menu at the top and we will see a
script window as shown in the screen below

Now we will write our customized stored procedure for the EmpDetails table which we created in
our earlier tutorial(Check my previous article for table creation) as shown in the screen below
Once we create the structure for the stored procedure as shown in the above screen we need to save
it. Once save we can use the stored procedure to execute the same as shown in the screen below.
We need to navigate to the new query window in the Database section and write a execute
command as shown below.

We can create n Number of stored procedure as per the requirement and use it across the process
which we normally do with the traditional SQL Server locally.

INPUT SET:

OUTPUT SET:
EXPECTED VIVA QUESTIONS:

Q.1 What is Microsoft Azure?


Q.2 What is the difference between traditional datacenters and cloud?
Q.3 What is the relationship between SOA and cloud architecture?

NAME OF FACULTY:
SIGNATURE:
DATE:

EXPERIMENT NO. 11
Unit/Topic: 5/Aneka
PROBLEM DEFINITION:
Working with Mangrasoft Aneka Software.

OBJECTIVE:
Study of Mangrasoft Aneka Software and its behaviour.

REQUIREMENT:
ECMA Runtime Environment, Database

THEORY:
Theory attached here.

Installation
This section assumes that you have a copy of the Aneka distribution with you. If you do not have a
copy already, you can download the latest version from Manjrasoft’s Website.

Installing Aneka Cloud Management Studio


Aneka installation begins with installing Aneka Cloud Management Studio. The Cloud
Management Studio is your portal for creating, configuring and managing Aneka Clouds.
Installing Aneka using the distributed Microsoft Installer Package (MSI) is a quick process
involving three steps as described below.

Step 1 – Run the installer package to start the Setup Wizard

Figure - Welcome Page


The Welcome Page is self-explanatory and you can proceed by clicking next.
Step 2 – Specifying the installation folder
In Step 2 you specify the installation folder. By default Aneka is installed in C:\Program
Files\Manjrasoft\Aneka.3.0.

Figure - Specifying the installation folder


Step 3 – Confirm and start the installation
At this point you are ready to begin the installation. Click “Next” to start the installation or “Back”
to change your installation folder.

Figure - Confirm Installation


Once the installation is complete, close the wizard and launch Aneka Management Studio from the
start menu.
Figure - Installation Progress

Figure - Installation Complete


Figure - Start Menu

Aneka Cloud Management Studio


The Aneka Cloud Management Studio is your portal for managing your infrastructure and clouds.
It provides facilities for defining your underlying cloud infrastructure and creating one or more
Aneka Clouds on top. It lets you create and manage Aneka user accounts, monitor the overall
performance of your Cloud, obtain detailed reporting information on resource usage, data
transfers, billing and application (job) execution. It also provides facilities for troubleshooting
your deployments by allowing you to access and examine remote logs.

Starting up Management Studio


Figure - Starting Aneka Cloud Management Studio for the first time.

When Aneka Cloud Management Studio is started up for the first time you’ll be asked to create a
Remote Repository for performing remote installations. Setting up a Remote Repository requires
selecting a suitable repository type and supplying valid credentials which remote machines can use
to connect and download required files. You may however choose to create this repository at a
late time before making remote installations. If no repository is defined, you will be restricted to
making local installations only.

Figure - Creating a repository for remote installations

Shutting down Aneka Management Studio


When attempting to shut down Aneka Management Studio, you will be given the choice of saving
all configuration data from the current session. It is highly recommended that you save this
information and restore it the next time you start using the Management Studio.
The Configuration File
The configuration file, ManagementStudio.config, contains all information that describes your
infrastructure, your Clouds, the machine credentials, repositories and authentication keys (see
section on installing the Master Container) that you defined when using Aneka Management
Studio. It is recommended that you save this information when you exit Management Studio
so that you can restore it at a later session, and get up-to-speed with your Cloud management
without having to redefine all settings again. Some configuration information, such as
authentication keys, must be maintained safely if you are to add new Containers to your existing
Cloud. Losing an authentication key however, is not detrimental as you will be able to reconfigure
your clouds with a new key.

Figure - Request to save configuration data when closing Management Studio

The configuration file is always encrypted before being written to disk for security reasons.
When saving configuration data you will be required to specify a password as show in
Figure.

Figure - Password to encrypt configuration data

When starting up Aneka Management Studio at a later session, you will be given the choice of
restoring your configuration data. If you choose to do so, you must re-enter the same password you
used when saving.
Figure - Request to restore configuration data

INPUT SET:

OUTPUT SET:

EXPECTED VIVA QUESTIONS:

Q.1 Uses of Aneka Software?


Q.2 what is Management studio?

NAME OF FACULTY:
SIGNATURE:
DATE:
EXPERIMENT NO. 12
Unit/Topic: 5/Cloud Security Services
PROBLEM DEFINITION:
Study of Cloud Security Management.

OBJECTIVE:
To understand Different cloud security management issues and software.

THEORY:
Theory attached here.
Seven principles that support information assurance
OR
Factors that directly affect cloud software assurance

Confidentiality Confidentiality refers to the prevention of intentional or unintentional


unauthorized disclosure of information. Confidentiality in cloud systems is
related to the areas of intellectual property rights, covert channels, traffic
analysis, encryption, and inference.
Integrity The concept of cloud information integrity requires that the following three
principles are met:
Modifications are not made to data by unauthorized personnel or processes.
Unauthorized modifications are not made to data by authorized personnel or
processes.
The data is internally and externally consistent — in other words, the internal
information is consistent both among all sub-entities and with the real-world,
external situation.
Availability Availability ensures the reliable and timely access to cloud data or cloud
computing resources by the appropriate personnel. Availability guarantees that
the systems are functioning properly when needed. In addition, this concept
guarantees that the security services of the cloud system are in working order.
A denial-of-service attack is an example of a threat against availability.
Confidentiality, integrity, and availability are sometimes known as the CIA triad of information
system security, and are important pillars of cloud software assurance. The reverse of
confidentiality, integrity, and availability is disclosure, alteration, and destruction (DAD).
Cloud Security Services
Authentication Authentication is the testing or reconciliation of evidence of a user’s identity. It
establishes the user’s identity and ensures that users are who they claim to be.
For example, a user presents an identity (user ID) to a computer login screen and
then has to provide a password.
Authorization Authorization refers to rights and privileges granted to an individual or process
that enable access to computer resources and information assets.
Auditing To maintain operational assurance, organizations use two basic methods:
System audits and monitoring. These methods can be employed by the cloud
customer, the cloud provider, or both, depending on asset architecture and
deployment.
A system audit is a one-time or periodic event to evaluate security.
Monitoring refers to an ongoing activity that examines either the system or
the users, such as intrusion detection.
Accountability Accountability is the ability to determine the actions and behaviors of a single
individual within a cloud system and to identify that particular individual.

Many of Security challenges can and should be addressed through management initiatives and
management processes. These include the following:
List of Management Initiatives

Require clearly delineating the ownership and responsibility roles of both the CSP (which
may or may not be the organization itself) and the organization functioning in the role as
customer.
Proper security controls must be implemented based on asset, threat, and vulnerability risk
assessment matrices.
Security policy implementation.
Computer intrusion detection and response.
Virtualization security management.

Virtualization Security Management

Threats and vulnerabilities inherent in virtualized systems.

Virtual Threats
Some threats to virtualized systems are general in nature, as they are inherent threats to all
computerized systems (such as denial-of-service, or DoS, attacks).
Some threats and vulnerabilities, however, are unique to virtual machines.
Various organizations are currently conducting security analysis and proof of- concept (PoC)
attacks against virtualized systems

Vulnerabilities

Some of the vulnerabilities exposed to any malicious-minded individuals:


Many VM vulnerabilities
stem from the fact that
vulnerability in one VM
system can be exploited
to attack other VM
systems or the host
systems, as multiple
virtual machines share
the same physical
hardware, as shown in
Figure.

Shared clipboard — Keystroke logging — Some VM technologies enable the logging of


Shared clipboard keystrokes and screen updates to be passed across virtual terminals in the
technology allows data to virtual machine, writing to host fi les and permitting the monitoring of
be transferred between encrypted terminal connections inside the VM.
VMs and the host,
providing a means of
moving data between
malicious programs in
VMs of different security
realms.
Virtual machine VM monitoring from the host — Because all network packets coming from
backdoors — A or going to a VM pass through the host, the host may be able to affect the
backdoor, covert VM by the following:
communications channel Starting, stopping, pausing, and restart VMs
between the guest and Monitoring and configuring resources available to the VMs, including
host could allow intruders CPU, memory, disk, and network usage of VMs
to perform potentially Monitoring the applications running inside the VM
dangerous operations. Viewing, copying, and modifying data stored on the VM’s virtual disks

ESX Server Application Vulnerability Severity Code Definitions


Table shows
how
VMware’s
ESX server
vulnerabilities
can be
categorized,
as interpreted
by the DoD.

Ways to protect the virtual machine OR Best practices for virtualized systems.

Hardening the Host Operating System

Limiting Physical Access to the Host

Using Encrypted Communications

Disabling Background Tasks

Updating and Patching: Most standards organizations enforce the concept of timely patching and
updating of systems. Means that not only must you patch and update the host OS promptly, but
each of the virtual machines requires the same patching schedule.

Implementing File Integrity Checks

Maintaining Backups

Virtualized systems Infrastructure users may have different roles and responsibilities.

The roles assumed by administrators are:

Virtualization Server Administrator

Virtual Machine Administrator

Guest Administrator
EXPECTED VIVA QUESTIONS:

Q.1 what are the security laws which take care of the data in the cloud?
Q.2 How to secure your data for transport in cloud?
Q.3 what do you understand from VPN?

NAME OF FACULTY:
SIGNATURE:
DATE:

You might also like