
Hello Students, are you looking for help with Cloud Computing NPTEL week 6 assignment answers? So, here in this article, we have provided the Cloud Computing week 6 assignment answer hints.
NPTEL Cloud Computing Assignment 6 Answers
Q1. Modification threat on cloud security is an example of:
a. Deception
b. Disclosure
c. Disruption
d. Usurpation
Answer: Option A, C, and D.
900+ Students have taken the benefit of instant notification, Join us on telegram.
Q2. Which of the following is/are example(s) of passive attack?
a. Replay
b. Denial of service
c. Traffic analysis
d. Masquerade
Answer: c. Traffic analysis
Q3. Interception is an attack on integrity
a. TRUE
b. FALSE
Answer: b. FALSE
Q4. Statement I: Intrusion Detection System (IDS) scans the incoming messages, and creates alerts when suspected scans/attacks are in progress.
Statement II: Authentication is the identification of legitimate users.
a. Statement I is TRUE and statement II is FALSE.
b. Statement I is FALSE and statement II is TRUE.
c. Both statements are TRUE.
d. Both statements are FALSE.
Answer: c. Both statements are TRUE.
Q5.
1. Injection attack | (a) Attacker sending huge amounts of requests to a certain service and causing denial of service. |
2. Flooding | (b) Browser-based security issues. |
3. Metadata (WSDL) spoofing attack | (c) Introduce malicious code to change the course of execution. |
(d) Malicious reengineering of Web Services’ metadata description. |
a. 1-(a), 2-(b), 3-(d)
b. 1-(c), 2-(a), 3-(d)
c. 1-(b), 2-(c), 3-(d)
d. 1-(a), 2-(c), 3-(d)
Answer: b. 1-(c), 2-(a), 3-(d)
Q6. Recovery Time Objective (RTO) represents the period of time allowed for the complete execution of the task.
a. TRUE
b. FALSE
Answer: b. FALSE
Q7. The correct statement(s) for necessary and sufficient conditions for the detection of inheritance conflict is/are:
a. Sufficient condition: current entry role and at least one exit role forms conflicting pair
b. Sufficient condition: current entry role is senior to at least one exit role
c. Necessary condition: current entry role is senior to at least one exit role
d. Necessary condition: at least one exit role
Answer: Option B and D.
Q8. Which of the following is/are hypervisor risks associated with VM escape?
a. Vulnerable virtual machine applications like Vmchat, VMftp, Vmcat etc.
b. Rogue hypervisor that hides itself from normal malware detection systems
c. Improper configuration of VM
d. Rogue hypervisor that creates a covert channel to dump unauthorized code
Answer: Option A and C.
Q9. In fault tolerance, replication is the duplication of critical components of a system with the intention of increasing reliability of the system, usually in the case of a backup or fail-safe.
a. TRUE
b. FALSE
Answer: b. FALSE
Q10. Which of the following Open-source tools is/are used for retrieving web pages in Amazon EC2 platform?
a. wget
b. hping
c. ifconfig
d. nmap
Answer: a. wget
TELEGRAM FOR NOTIFICATION | Click Here |
Follow on Google News (in one click) | Click Here |
Disclaimer: These answers are provided only for the purpose to help students to take references. This website does not claim any surety of 100% correct answers. So, this website urges you to complete your assignment yourself.
Also Available: