Cloud Computing | Week 6
Session: JAN-APR 2023
Course Name: Cloud Computing
Course Link: Click Here
These are Nptel Cloud Computing week 6 Assignment 6 Answers
Q1. Interception is an attack on:
A. Integrity
B. Availability
C. Confidentiality
D. Authenticity
Answer: C. Confidentiality
Q2. Which of the following is/are the recovery goal(s) of the security mechanism?
A. Stop attack, assess and repair damage
B. Detect attackers’ violation of security policy
C. Prevent attackers from violating security policy
D. Continue to function correctly even if attack succeeds
Answer: A, D
These are Nptel Cloud Computing week 6 Assignment 6 Answers
Q3. Replay attack, which is the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect, is an active attack.
A. True
B. False
Answer: A. True
Q4. Statement I: Authorization is the identification of legitimate users.
Statement II: Integrity is the protection against data alteration/corruption.
A. Statement I is TRUE and statement II is FALSE.
B. Statement I is FALSE and statement II is TRUE.
C. Both statements are TRUE.
D. Both statements are FALSE.
Answer: B. Statement I is FALSE and statement II is TRUE.
These are Nptel Cloud Computing week 6 Assignment 6 Answers
Q5. Which of the following is/are NOT passive attacks?
A. Masquerade
B. Release of message contents
C. Denial of service
D. Modification
Answer: A, C, D
Q6. In full virtualization, VMs interact with the host OS.
A. True
B. False
Answer: B. False
These are Nptel Cloud Computing week 6 Assignment 6 Answers
Q7. When selecting the most suitable cloud provider satisfying customer’s QoS requirements using a
fuzzy inference engine, if the “Degree of SLA Satisfaction” is greater than the “Threshold for a
cloud service provider”, the customer should migrate to a different provider.
A. True
B. False
Answer: B. False
Q8. Which of the following Open-source tools is/are used to perform TCP connect probes in Amazon EC2 platform?
A. wget
B. nmap
C. ifconfig
D. hping
Answer: B. nmap
These are Nptel Cloud Computing week 6 Assignment 6 Answers
Q9. Statement I: Recovery Point Objective (RPO) is the maximum amount of data that will be lost
following an interruption or disaster.
Statement II: Recovery Time Objective (RTO) is the amount of data that will be lost following an
interruption or disaster.
A. Statement | is TRUE and statement Il is FALSE.
B. Statement | is FALSE and statement Il is TRUE.
C. Both statements are TRUE.
D. Both statements are FALSE.
Answer: A. Statement | is TRUE and statement Il is FALSE.
Q10. List the motivation(s) in having a ‘middle man’ or intelligent broker for cloud marketplace:
A. Trustworthiness of the provider.
B. Monitoring of services.
C. Ensuring vendor lock-in.
D. Flexible selection of cloud provider.
Answer: A, B, D
These are Nptel Cloud Computing week 6 Assignment 6 Answers
All weeks of Cloud Computing: Click here
More NPTEL course: Click Here
Session: JULY-DEC 2022
Course name: Cloud Computing NPTEL
Link to Enroll: Click Here
These are Nptel Cloud Computing week 6 Assignment 6 Answers
Q1. Modification threat on cloud security is an example of
A. Deception
B. Disclosure
C. Disruption
D. Usurpation
Answer: a, c, d
Q2. Which of the following is/are example(s) of passive attack?
A. Replay
B. Denial of service
C. Traffic analysis
D. Masquerade
Answer: c
Q3. Interception is an attack on integrity
A. TRUE
B. FALSE
Answer: b
These are Nptel Cloud Computing week 6 Assignment 6 Answers
Q4. Statement I: Intrusion Detection System (IDS) Scans the incoming messages, and creates alerts when suspected scans/attacks are in progress.
Statement ll: Authentication is the identification of legitimate users
A. Statement I is TRUE and statement II is FALSE
B. Statement l is FALSE and statement Il is TRUE.
C. Both statements are TRUE.
D. Both statements are FALSE.
Answer: c
Q5.

Answer: b
Q6. Recovery lime Objective (RIO) represents the period of time allowed for the complete execution pf the task.
A. TRUE
B. FALSE
Answer: b
Q7. The correct statement(s) for necessary and sufficient conditions for the detectionof inheritance conflict is/are:
A. Sufficient condition: current entry role and at least one exit role forms conflicting pair
B. Sufficient condition: current entry role is senior to at least one exit role
C. Necessary condition: current entry role is senior to at least one exit role
D. Necessary condition: at least one exit role
Answer: a, d
These are Nptel Cloud Computing week 6 Assignment 6 Answers
Q8. Which of the following is/are hypervisor risks assOCiated With VM escape?
A. Vulnerable virtual machine applications like Vmchat, VMíftp, Vmcat etc.
B. Rogue hypervisor that hides itself from normal malware detection systems
C. Improper configuration of VM
D. Rogue hypervisor that creates a covert channel to dump unauthorized code
Answer: a, c
Q9. In fault tolerance, replication is the duplication of critical components of a system with the intention of increasing relability of the system, usually in the case of a backup or fail-sate.
A. TRUE
B. FALSE
Answer: b
Q10. Which of the folloWing Open-source tools is/are used for retrieving web pages in Amazon EC2 platform?
A. Wget
B. hping
C. ifconfig
D. nmap
Answer: a
These are Nptel Cloud Computing week 6 Assignment 6 Answers
More NPTEL course answers: https://progiez.com/nptel
* The material and content uploaded on this website are for general information and reference purposes only. Please do it by your own first. COPYING MATERIALS IS STRICTLY PROHIBITED.
More from PROGIEZ
