The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 103 Weeks Ago, 3 Days Ago |
| Questions Answered: | 4870 |
| Tutorials Posted: | 4863 |
MBA IT, Mater in Science and Technology
Devry
Jul-1996 - Jul-2000
Professor
Devry University
Mar-2010 - Oct-2016
The attached document has the questions. mmmmmmmmm
Â
ISSC326 Cloud Computng Final Case STudyName___________________1)Fundamental Concepts and ModelsTest question(15pts)Company BCompany B is an IT hosting company that provides a range of shared services used bya wide variety of customers. One of Company B's customers is Company A. Specifically,Company A's marketing department has been using a service hosted by Company B'son-premise environment. The service provides functions for conducting public surveys.Recently, Company A complained about Company B's billing practices and the reliabilityof its hosting environment.Company B currently charges all of its customers a flat fee,regardless of how much or how frequently a given customer uses the service.Furthermore, the public survey service has been repeatedly attacked and has thereforenot always been available for Company A and other customers.In response to the complaints from Company A, Company B is considering using acloud-based hosting platform. Which specific characteristics of a cloud will be helpful toaddress CompanyB's problems?2) Fundamental Cloud SecurityTest question(15pts)The diagram below illustrates interaction between two cloud service consumers (A and B) andtwo virtual servers (A and B) hosted on a cloud.Based on the limited information provided in the depicted scenarios, list the types of attacks that couldpotentially be carried out if any of the programs outside of the cloud were malicious. Provide a briefexplanation justifying the threat of each proposed attack.
Attachments: