Sign Up

Sign In

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

You must login to ask a question.

NPTEL Cloud Computing Assignment 6 Answers 2022

NPTEL Cloud Computing Assignment Answers

Hello Students, are you looking for help with Cloud Computing NPTEL week 6 assignment answers? So, here in this article, we have provided the Cloud Computing week 6 assignment answer hints.

NPTEL Cloud Computing Assignment 6 Answers

Q1. Modification threat on cloud security is an example of:

a. Deception
b. Disclosure

c. Disruption

d. Usurpation

Answer: Option A, C, and D.

900+ Students have taken the benefit of instant notification, Join us on telegram.


Q2. Which of the following is/are example(s) of passive attack?

a. Replay

b. Denial of service

c. Traffic analysis

d. Masquerade

Answer: c. Traffic analysis


Q3. Interception is an attack on integrity

a. TRUE

b. FALSE

Answer: b. FALSE


Q4. Statement I: Intrusion Detection System (IDS) scans the incoming messages, and creates alerts when suspected scans/attacks are in progress.

Statement II: Authentication is the identification of legitimate users.

a. Statement I is TRUE and statement II is FALSE.

b. Statement I is FALSE and statement II is TRUE.

c. Both statements are TRUE.

d. Both statements are FALSE.

Answer: c. Both statements are TRUE.


Q5.

1. Injection attack(a) Attacker sending huge amounts of requests to a certain service and causing denial of service.
2. Flooding(b) Browser-based security issues.
3. Metadata (WSDL) spoofing attack(c) Introduce malicious code to change the course of execution.
(d) Malicious reengineering of Web Services’ metadata description.

a. 1-(a), 2-(b), 3-(d)

b. 1-(c), 2-(a), 3-(d)

c. 1-(b), 2-(c), 3-(d)

d. 1-(a), 2-(c), 3-(d)

Answer: b. 1-(c), 2-(a), 3-(d)


Q6. Recovery Time Objective (RTO) represents the period of time allowed for the complete execution of the task.

a. TRUE

b. FALSE

Answer: b. FALSE


Q7. The correct statement(s) for necessary and sufficient conditions for the detection of inheritance conflict is/are:

a. Sufficient condition: current entry role and at least one exit role forms conflicting pair

b. Sufficient condition: current entry role is senior to at least one exit role

c. Necessary condition: current entry role is senior to at least one exit role

d. Necessary condition: at least one exit role

Answer: Option B and D.


Q8. Which of the following is/are hypervisor risks associated with VM escape?

a. Vulnerable virtual machine applications like Vmchat, VMftp, Vmcat etc.

b. Rogue hypervisor that hides itself from normal malware detection systems

c. Improper configuration of VM

d. Rogue hypervisor that creates a covert channel to dump unauthorized code

Answer: Option A and C.


Q9. In fault tolerance, replication is the duplication of critical components of a system with the intention of increasing reliability of the system, usually in the case of a backup or fail-safe.

a. TRUE

b. FALSE

Answer: b. FALSE


Q10. Which of the following Open-source tools is/are used for retrieving web pages in Amazon EC2 platform?

a. wget

b. hping

c. ifconfig

d. nmap

Answer: a. wget


TELEGRAM FOR NOTIFICATIONClick Here
Follow on Google News (in one click)Click Here

Disclaimer: These answers are provided only for the purpose to help students to take references. This website does not claim any surety of 100% correct answers. So, this website urges you to complete your assignment yourself.


Also Available:

NPTEL Cloud Computing Assignment 5 Answers

NPTEL Cloud Computing Assignment 7 Answers

Related Posts