Cloud Computing | Week 6

Session: JAN-APR 2024

Course Name: Cloud Computing

Course Link: Click Here

For answers or latest updates join our telegram channel: Click here to join

These are Nptel Cloud Computing Week 6 Assignment 6 Answers


Q1. Modification is an attack on:
A) Authenticity
B) Integrity
C) Confidentiality
D) Availability

Answer: B) Integrity


Q2. Which of the following is/are example(s) of passive attack?
A) Replay
B) Denial of service
C) Traffic analysis
D) Masquerade

Answer: C) Traffic analysis


For answers or latest updates join our telegram channel: Click here to join

These are Nptel Cloud Computing Week 6 Assignment 6 Answers


Q3. Which of the following is/are the recovery goal(s) of the security mechanism?
A) Prevent attackers from violating security policy
B) Detect attackers’ violation of security policy
C) Stop attack, assess and repair damage
D) Continue to function correctly even if attack succeeds

Answer: C), D)


Q4. Statement I: Authorization is the identification of legitimate users.
Statement II: Integrity is the protection against data alteration/corruption.

A. Statement I is TRUE and statement II is FALSE.
B. Statement I is FALSE and statement II is TRUE.
C. Both statements are TRUE.
D. Both statements are FALSE.

Answer: B. Statement I is FALSE and statement II is TRUE.


For answers or latest updates join our telegram channel: Click here to join

These are Nptel Cloud Computing Week 6 Assignment 6 Answers


Q5. Which of the following is/are hypervisor risks associated with rogue hypervisor rootkits?
A) Vulnerable virtual machine applications like Vmchat, VMftp, Vmcat etc.
B) Hypervisor that hides itself from normal malware detection systems
C) Improper configuration of VM.
D) Hypervisor that creates a covert channel to dump unauthorized code.

Answer: B), D)


Q6.
A) 1-(a), 2-(b), 3-(d)
B) 1-(c), 2-(a), 3-(d)
C) 1-(b), 2-(c), 3-(d)
D) 1-(a), 2-(c), 3-(d)

Answer: B) 1-(c), 2-(a), 3-(d)


For answers or latest updates join our telegram channel: Click here to join

These are Nptel Cloud Computing Week 6 Assignment 6 Answers


Q7. Recovery Time Objective (RTO) represents the period of time allowed for the complete execution of the task.
A) TRUE
B) FALSE

Answer: B) FALSE


Q8. Which of the following Open-source tools is/are used to perform TCP connect probes on the Amazon EC2 platform?
A) nmap
B) wget
C) ipconfig
D) hping

Answer: A) nmap


For answers or latest updates join our telegram channel: Click here to join

These are Nptel Cloud Computing Week 6 Assignment 6 Answers


Q9. In para virtualization, VMs interact with the host OS.
A) TRUE
B) FALSE

Answer: A) TRUE


Q10. In conflict removal, when is introduction of a virtual role required?
A) In case of violation of SoD constraint violation.
B) In case of cyclic inheritance conflict where exactly matched role set exists.
C) In case of cyclic inheritance conflict where no exactly matched role set exists.
D) None of the above.

Answer: C) In case of cyclic inheritance conflict where no exactly matched role set exists.


For answers or latest updates join our telegram channel: Click here to join

These are Nptel Cloud Computing Week 6 Assignment 6 Answers

More Weeks of Cloud Computing: Click here

More Nptel Courses: Click here


Session: JULY-DEC 2023

Course Name: Cloud Computing

Course Link: Click Here

These are Nptel Cloud Computing week 6 Assignment 6 Answers


Q1. Fabrication is an attack on :
A) Integrity
B) Confidentiality
C) Authenticity
D) Availability

Answer: C) Authenticity


Q2. Reliability and efficiency are basic components of security.
A) True
B) False

Answer: B) False


Q3. Spoofing threat on cloud security is an example of.
A) Deception
B) Disruption
C) Usurpation
D) Disclosure

Answer: A, C


These are Nptel Cloud Computing week 6 Assignment 6 Answers


Q4. Statement I : Intrusion Detection System (IDS) scans the incoming messages, and creates alerts when suspected scans/attacks are in progress.
Statement II : Authentication is the determination of whether or not an operation is allowed by a certain user.

A) Statement I is TRUE and Statement II is FALSE.
B) Statement II is TRUE and Statement I is FALSE.
C) Both statements are TRUE.
D) Both statements are FALSE.

Answer: A) Statement I is TRUE and Statement II is FALSE.


Q5. Which of the following is/are hypervisor risks associated with rough hypervisor root kits?
A) Improper configuration of VM.
B) Hypervisor that hides itself from normal malware detection systems.
C) Hypervisor that creates a covert channel to dump unauthorized code.
D) Vulnerable virtual machine applications like Vmchat. VMftp. Vmcat etc.

Answer: B, C


Q6. In fault tolerance, replication is mirroring/sharing data over disks which are located in separate physical locations to maintain consistency.
A) True
B) False

Answer: A) True


These are Nptel Cloud Computing week 6 Assignment 6 Answers


Q7. In which of the following web service(s) based security attacks does(do) the attacker send huge amounts of requests to a certain service, causing denial of service?
A) Injection attack
B) Flooding
C) Cross-site scripting (XSS)
D) Metadata (WSDL) spoofing attack

Answer: B) Flooding


Q8. When is it better to switch cloud providers?
A) Contract price decrease
B) Provider bankruptcy
C) Provider service shutdown
D) Increase in service quality

Answer: B, C


Q9. Which of the following Open-source tools is/are used to perform TCP SYN trace routes on the Amazon EC2 platform?
A) wget
B) nmap
C) ipconfig
D) hping

Answer: D) hping


These are Nptel Cloud Computing week 6 Assignment 6 Answers


Q10. In risk-based access control (RAC), computing security uncertainty is addressed.
A) True
B) False

Answer: B) False


These are Nptel Cloud Computing week 6 Assignment 6 Answers


More Weeks: Click here

More Nptel Courses: Click here


Session: JAN-APR 2023

Course Name: Cloud Computing

Course Link: Click Here

These are Nptel Cloud Computing week 6 Assignment 6 Answers


Q1. Interception is an attack on:
A. Integrity
B. Availability
C. Confidentiality
D. Authenticity

Answer: C. Confidentiality


Q2. Which of the following is/are the recovery goal(s) of the security mechanism?
A. Stop attack, assess and repair damage
B. Detect attackers’ violation of security policy
C. Prevent attackers from violating security policy
D. Continue to function correctly even if attack succeeds

Answer: A, D


These are Nptel Cloud Computing week 6 Assignment 6 Answers


Q3. Replay attack, which is the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect, is an active attack.
A. True
B. False

Answer: A. True


Q4. Statement I: Authorization is the identification of legitimate users.
Statement II: Integrity is the protection against data alteration/corruption.

A. Statement I is TRUE and statement II is FALSE.
B. Statement I is FALSE and statement II is TRUE.
C. Both statements are TRUE.
D. Both statements are FALSE.

Answer: B. Statement I is FALSE and statement II is TRUE.


These are Nptel Cloud Computing week 6 Assignment 6 Answers


Q5. Which of the following is/are NOT passive attacks?
A. Masquerade
B. Release of message contents
C. Denial of service
D. Modification

Answer: A, C, D


Q6. In full virtualization, VMs interact with the host OS.
A. True
B. False

Answer: B. False


These are Nptel Cloud Computing week 6 Assignment 6 Answers


Q7. When selecting the most suitable cloud provider satisfying customer’s QoS requirements using a
fuzzy inference engine, if the “Degree of SLA Satisfaction” is greater than the “Threshold for a
cloud service provider”, the customer should migrate to a different provider.

A. True
B. False

Answer: B. False


Q8. Which of the following Open-source tools is/are used to perform TCP connect probes in Amazon EC2 platform?
A. wget
B. nmap
C. ifconfig
D. hping

Answer: B. nmap


These are Nptel Cloud Computing week 6 Assignment 6 Answers


Q9. Statement I: Recovery Point Objective (RPO) is the maximum amount of data that will be lost
following an interruption or disaster.
Statement II: Recovery Time Objective (RTO) is the amount of data that will be lost following an
interruption or disaster.

A. Statement | is TRUE and statement Il is FALSE.
B. Statement | is FALSE and statement Il is TRUE.
C. Both statements are TRUE.
D. Both statements are FALSE.

Answer: A. Statement | is TRUE and statement Il is FALSE.


Q10. List the motivation(s) in having a ‘middle man’ or intelligent broker for cloud marketplace:
A. Trustworthiness of the provider.
B. Monitoring of services.
C. Ensuring vendor lock-in.
D. Flexible selection of cloud provider.

Answer: A, B, D


These are Nptel Cloud Computing week 6 Assignment 6 Answers

All weeks of Cloud Computing: Click here

More NPTEL course: Click Here


Session: JULY-DEC 2022

Course name: Cloud Computing NPTEL

Link to Enroll: Click Here

These are Nptel Cloud Computing week 6 Assignment 6 Answers


Q1. Modification threat on cloud security is an example of
A. Deception
B. Disclosure
C. Disruption
D. Usurpation

Answer: a, c, d


Q2. Which of the following is/are example(s) of passive attack?
A. Replay
B. Denial of service
C. Traffic analysis
D. Masquerade

Answer: c


Q3. Interception is an attack on integrity
A. TRUE
B. FALSE

Answer: b


These are Nptel Cloud Computing week 6 Assignment 6 Answers


Q4. Statement I: Intrusion Detection System (IDS) Scans the incoming messages, and creates alerts when suspected scans/attacks are in progress.
Statement ll: Authentication is the identification of legitimate users

A. Statement I is TRUE and statement II is FALSE
B. Statement l is FALSE and statement Il is TRUE.
C. Both statements are TRUE.
D. Both statements are FALSE.

Answer: c


Q5.

These are solution of Cloud Computing NPTEL Week 6 Assignment

Answer: b


Q6. Recovery lime Objective (RIO) represents the period of time allowed for the complete execution pf the task.
A. TRUE
B. FALSE

Answer: b


Q7. The correct statement(s) for necessary and sufficient conditions for the detectionof inheritance conflict is/are:
A. Sufficient condition: current entry role and at least one exit role forms conflicting pair
B. Sufficient condition: current entry role is senior to at least one exit role
C. Necessary condition: current entry role is senior to at least one exit role
D. Necessary condition: at least one exit role

Answer: a, d


These are Nptel Cloud Computing week 6 Assignment 6 Answers


Q8. Which of the following is/are hypervisor risks assOCiated With VM escape?
A. Vulnerable virtual machine applications like Vmchat, VMíftp, Vmcat etc.
B. Rogue hypervisor that hides itself from normal malware detection systems
C. Improper configuration of VM
D. Rogue hypervisor that creates a covert channel to dump unauthorized code

Answer: a, c


Q9. In fault tolerance, replication is the duplication of critical components of a system with the intention of increasing relability of the system, usually in the case of a backup or fail-sate.
A. TRUE
B. FALSE

Answer: b


These are Nptel Cloud Computing week 6 Assignment 6 Answers


Q10. Which of the folloWing Open-source tools is/are used for retrieving web pages in Amazon EC2 platform?
A. Wget
B. hping
C. ifconfig
D. nmap

Answer: a


These are Nptel Cloud Computing week 6 Assignment 6 Answers

More NPTEL course answers: https://progiez.com/nptel


These are Nptel Cloud Computing week 6 Assignment 6 Answers
The content uploaded on this website is for reference purposes only. Please do it yourself first.