+91 90691 39140 | +1 253 214 3115 | info@hub4tech.com | hub4tech

Ubuntu Cloud Interview Questions and Answers

1
What components have been released by ubuntu for their for their cloud strategy?

Ubuntu till date has released three components, they are named as :

  • Ubuntu Server Edition on Amazon EC2 (IaaS)
  • Ubuntu enterprise cloud powered by Eucalyptus (IaaS)
  • UbuntuOne(SaaS)

The first two components are targeted for the infrastructure layer of the computer stack. And UbuntuOne is meant for the software layer also known as Software as a service (SaaS).

2
Tell me What are the different types of actors involved in Authentication and Authorization?

There are two types of actors that are required for authentication and authorization:
User or administrator of the system who has the rights to start and stop the instances of the system.
Components of the systems that are required to be present to fully utilize the requests.
The authentication on ubuntu cloud is being performed by X509 certificate that consists of cryptographic keys for authentication and secure communications between all the actors.

3
List out a few of the uses of the private cloud concept.

The private cloud concept has a variety of usage scenarios. Some of them are :

  • It enables an organization to rapidly develop and also prototype cloudware applications. Also this can be done behind a firewall enabling the creation/development of privacy sensitive applications such as classified data handling.
  • Being an elastic platform it enables the use of high performance applications whose load can be fluctuating. The system is based on aggregated peak loads of different applications at a single point of time.
  • By using private cloud concept the organization can assign a pool of hardware inside the firewall henceforth enabling it to be assigned to the users by a common gui to speed up the process.
4
Do you know what are the steps involved in authenticating and authorizing the user?

To authenticate and authorize the user there are two steps involved:

  1. User should have access to the cloud controller account and access to its user interface.
  2. Administrative rights to the user to create their own policies.

The registered users get a access key that gives the certificate and the query information to the user which can be used to authorize the user’s status.
The authentication will vary for each user to access the cloud and its service. To authenticate the user a password will be given to access the web console and retrieve their certificate and query key. Cloud controller verifies the authentication only at the first time but the authorization is verified at each level.

5
What does private cloud offer in building an infrastructure?

Private cloud offers complete set of development tools and easy to configure panel where you can customize and deploy prototype applications.

  • It keeps the private sensitive application separate and hidden from the world.
  • It provides the provision to create high performance applications and include the concept of elasticity.
  • It uses a firewall and keeps all the resources in a pool that separates them with other resources that are made public.
Copyright ©2015 Hub4Tech.com, All Rights Reserved. Hub4Tech™ is registered trademark of Hub4tech Portal Services Pvt. Ltd.
All trademarks and logos appearing on this website are the property of their respective owners.
FOLLOW US