Cloud Computing Nptel Week 6 Assignment Answers

Are you looking for the Cloud Computing Nptel Week 6 Assignment Answers Look no further! Our platform provides precise and comprehensive Cloud Computing Nptel Assignment Solutions for Week 6 in this course

Course Link: Click Here


Cloud Computing Nptel Week 6 Assignment Answers images
Cloud Computing Nptel Week 6 Assignment Answers

Cloud Computing Nptel Week 6 Assignment Answers (Jan-Apr 2025)


  1. HBase is a distributed ________ database built on top of the Hadoop file system.
    a) Row-oriented
    b) Tuple-oriented
    c) Column-oriented
    d) None of the mentioned

View Answer


  1. Apache Cassandra is a massively scalable open source _______ database.
    a) SQL
    b) NewSQL
    c) NoSQL
    d) None of the mentioned

View Answer


  1. A small chunk of data residing in one machine which is part of a cluster of machines holding one HBase table is known as__________________
    a) Rowarea
    b) Tablearea
    c) Split
    d) Region

View Answer


  1. Cell in HBase Table is a combination of _________________________
    a) Row and column family
    b) Row, column family and column qualifier
    c) Row, column family, column qualifier and row keys
    d) Row, column family, column qualifier and contains a value and a timestamp

View Answer


  1. Compute the approximate number of bits per entry and the number of hash functions needed for a false positive rate of 1%.
    a) 6.6 bits per key and 6 hash functions
    b) 9.6 bits per key and 7 hash functions
    c) 12.6 bits per key and 12 hash functions
    d) 9.6 bits per key and 6 hash functions

View Answer


  1. Consider the following statements: Statement 1: Scale out means grow your cluster capacity by replacing with more powerful machines.
    Statement 2: Scale up means incrementally grow your cluster capacity by adding more COTS machines (Components Off the Shelf).

a) Only statement 1 is true
b) Only statement 2 is true
c) Both statements are true
d) Both statements are false

View Answer


  1. Cassandra uses a protocol called _______ to discover location and state information.
    a) HBase
    b) Gossip
    c) Key-value
    d) None of the mentioned

View Answer


  1. Fill the correct choices for the given scenarios: P: _________________ Reads/writes complete reliably and quickly.
    Q: _________________ When thousands of customers are looking to book a flight, all updates from any client (e.g.- book a flight) should be accessible by other clients.
    R: _________________ Can happen across datacenters when the Internet gets disconnected.

a) P: Availability, Q: Consistency, R: Partition tolerance
b) P: Consistency, Q: Availability, R: Partition tolerance
c) P: Partition tolerance, Q: Consistency, R: Availability
d) P: Consistency, Q: Partition tolerance, R: Availability

View Answer


  1. ________________ a memory cache to store the in-memory copy of the data. It accumulates writes and provides read for data which are not yet stored to disk.
    a) Distributed Hash tables (DHT)
    b) Collection
    c) SSTable
    d) Memtable

View Answer


  1. In Cassandra, ______________ job is to determine which data centers and racks it should use to read data from and write data to.
    a) Client requests
    b) Partitioner
    c) Snitch
    d) None of the mentioned

View Answer


Cloud Computing Nptel Week 6 Assignment Answers (July-Dec 2024)


1. Interception is considered as an attack on

A) Confidentiality
B) Availability
C) Integrity
D) Authenticity

Answer: A) Confidentiality


2. Find the correct statement(s):

A) Different types of cloud computing service models provide different levels of security services
B) Adapting your on-premises systems to a cloud model requires that you determine what security mechanisms are required and mapping those to controls that exist in your chosen cloud service provider
C) Data should be transferred and stored in an encrypted format for security purposes
D) All are incorrect statements

Answer: A) Different types of cloud computing service models provide different levels of security services
B) Adapting your on-premises systems to a cloud model requires that you determine what security mechanisms are required and mapping those to controls that exist in your chosen cloud service provider
C) Data should be transferred and stored in an encrypted format for security purposes


3. Which of the following is/are example(s) of passive attack?

A) Replay
B) Denial of service
C) Traffic analysis
D) Masquerade

Answer:C) Traffic analysis


4. Modification is considered as an attack on

A) Confidentiality
B) Availability
C) Integrity
D) Authenticity

Answer: C) Integrity


5. Spoofing is not an example of

A) Deception
B) Disclosure
C) Usurpation
D) Disruption

Answer: B) Disclosure
D) Disruption


6. Consider the following statements:

Statement I: Authorization is the identification of legitimate users.
Statement II: Integrity is the protection against data alteration/corruption.

Identify the correct options:
A) Statement I is TRUE and statement II is FALSE.
B) Statement I is FALSE and statement II is TRUE.
C) Both statements are TRUE.
D) Both statements are FALSE.

Answer: B) Statement I is FALSE and statement II is TRUE.


7. Access policy control refers to

A) Cyclic Inheritance Control
B) Virus Attack
C) Violation of SoD (separation of duties) Constraint
D) Man in the middle attack

Answer: A) Cyclic Inheritance Control
C) Violation of SoD (separation of duties) Constraint


8. Which of the options is/are considered as the basic components of security?

A) Confidentiality
B) Integrity
C) Reliability
D) Efficiency

Answer: A) Confidentiality
B) Integrity


9. Which of the following is/are not a type of passive attack?

A) Traffic Analysis
B) Release of message contents
C) Denial of service
D) Replay

Answer: C) Denial of service
D) Replay


10. Side channel exploitation has the potential to extract RSA & AES secret keys

A) True
B) False

Answer: A) True


These are Cloud Computing Nptel Week 6 Assignment Answers

Cloud Computing NPTEL All weeks: Click Here

For answers to additional Nptel courses, please refer to this link: NPTEL Assignment Answers


Cloud Computing Nptel Week 6 Assignment Answers (JAN-APR 2024)

Course Name: Cloud Computing

Course Link: Click Here

For answers or latest updates join our telegram channel: Click here to join

These are nptel cloud computing week 6 answers


Q1. Modification is an attack on:
A) Authenticity
B) Integrity
C) Confidentiality
D) Availability

Answer: B) Integrity


Q2. Which of the following is/are example(s) of passive attack?
A) Replay
B) Denial of service
C) Traffic analysis
D) Masquerade

Answer: C) Traffic analysis


For answers or latest updates join our telegram channel: Click here to join

These are nptel cloud computing week 6 answers


Q3. Which of the following is/are the recovery goal(s) of the security mechanism?
A) Prevent attackers from violating security policy
B) Detect attackers’ violation of security policy
C) Stop attack, assess and repair damage
D) Continue to function correctly even if attack succeeds

Answer: C), D)


Q4. Statement I: Authorization is the identification of legitimate users.
Statement II: Integrity is the protection against data alteration/corruption.

A. Statement I is TRUE and statement II is FALSE.
B. Statement I is FALSE and statement II is TRUE.
C. Both statements are TRUE.
D. Both statements are FALSE.

Answer: B. Statement I is FALSE and statement II is TRUE.


For answers or latest updates join our telegram channel: Click here to join

These are nptel cloud computing week 6 answers


Q5. Which of the following is/are hypervisor risks associated with rogue hypervisor rootkits?
A) Vulnerable virtual machine applications like Vmchat, VMftp, Vmcat etc.
B) Hypervisor that hides itself from normal malware detection systems
C) Improper configuration of VM.
D) Hypervisor that creates a covert channel to dump unauthorized code.

Answer: B), D)


Q6.
A) 1-(a), 2-(b), 3-(d)
B) 1-(c), 2-(a), 3-(d)
C) 1-(b), 2-(c), 3-(d)
D) 1-(a), 2-(c), 3-(d)

Answer: B) 1-(c), 2-(a), 3-(d)


For answers or latest updates join our telegram channel: Click here to join

These are nptel cloud computing week 6 answers


Q7. Recovery Time Objective (RTO) represents the period of time allowed for the complete execution of the task.
A) TRUE
B) FALSE

Answer: B) FALSE


Q8. Which of the following Open-source tools is/are used to perform TCP connect probes on the Amazon EC2 platform?
A) nmap
B) wget
C) ipconfig
D) hping

Answer: A) nmap


For answers or latest updates join our telegram channel: Click here to join

These are nptel cloud computing week 6 answers


Q9. In para virtualization, VMs interact with the host OS.
A) TRUE
B) FALSE

Answer: A) TRUE


Q10. In conflict removal, when is introduction of a virtual role required?
A) In case of violation of SoD constraint violation.
B) In case of cyclic inheritance conflict where exactly matched role set exists.
C) In case of cyclic inheritance conflict where no exactly matched role set exists.
D) None of the above.

Answer: C) In case of cyclic inheritance conflict where no exactly matched role set exists.


For answers or latest updates join our telegram channel: Click here to join

These are nptel cloud computing week 6 answers

More Weeks of Cloud Computing: Click here

More Nptel Courses: Click here


Cloud Computing Nptel Week 6 Assignment Answers (July-Dec 2023)

Course Name: Cloud Computing

Course Link: Click Here

These are nptel cloud computing week 6 solutions


Q1. Fabrication is an attack on :
A) Integrity
B) Confidentiality
C) Authenticity
D) Availability

Answer: C) Authenticity


Q2. Reliability and efficiency are basic components of security.
A) True
B) False

Answer: B) False


Q3. Spoofing threat on cloud security is an example of.
A) Deception
B) Disruption
C) Usurpation
D) Disclosure

Answer: A, C


These are nptel cloud computing week 6 solutions


Q4. Statement I : Intrusion Detection System (IDS) scans the incoming messages, and creates alerts when suspected scans/attacks are in progress.
Statement II : Authentication is the determination of whether or not an operation is allowed by a certain user.

A) Statement I is TRUE and Statement II is FALSE.
B) Statement II is TRUE and Statement I is FALSE.
C) Both statements are TRUE.
D) Both statements are FALSE.

Answer: A) Statement I is TRUE and Statement II is FALSE.


Q5. Which of the following is/are hypervisor risks associated with rough hypervisor root kits?
A) Improper configuration of VM.
B) Hypervisor that hides itself from normal malware detection systems.
C) Hypervisor that creates a covert channel to dump unauthorized code.
D) Vulnerable virtual machine applications like Vmchat. VMftp. Vmcat etc.

Answer: B, C


Q6. In fault tolerance, replication is mirroring/sharing data over disks which are located in separate physical locations to maintain consistency.
A) True
B) False

Answer: A) True


These are nptel cloud computing week 6 solutions


Q7. In which of the following web service(s) based security attacks does(do) the attacker send huge amounts of requests to a certain service, causing denial of service?
A) Injection attack
B) Flooding
C) Cross-site scripting (XSS)
D) Metadata (WSDL) spoofing attack

Answer: B) Flooding


Q8. When is it better to switch cloud providers?
A) Contract price decrease
B) Provider bankruptcy
C) Provider service shutdown
D) Increase in service quality

Answer: B, C


Q9. Which of the following Open-source tools is/are used to perform TCP SYN trace routes on the Amazon EC2 platform?
A) wget
B) nmap
C) ipconfig
D) hping

Answer: D) hping


These are nptel cloud computing week 6 solutions


Q10. In risk-based access control (RAC), computing security uncertainty is addressed.
A) True
B) False

Answer: B) False