Sign Up

Sign In

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

You must login to ask a question.

NPTEL Cloud Computing Assignment 6 Answers Update 2022

Do you want help in NPTEL Cloud Computing Assignment 6 Answers? If yes, then you have landed on the right article where we have provided answer hints for you.

NPTEL Cloud Computing Assignment 6 Answers (Week 6)

Q1. In a cyber-attack, if one entity is pretending to be another one, then it is called.

a. Denial of Service
b. Replay
c. Masquerade
d. Modification

Answer: c. Masquerade

Follow Sikshapath’s Telegram Channel for instant notification of future updates.


Q2. Security responsibilities of a IaaS cloud service provider is typically up to

a. Guest OS
b. Application
c. Solution Stack
d. Hypervisor

Answer: d. Hypervisor


Q3. Which of the following security property ensures that subscriber can’t deny the action done by him/her.

a. Authorization
b. Non-repudiation
c. Confidentiality
d. Integrity

Answer: b. Non-repudiation


Q4. What is honeypot?

a. Manages network traffic filtering rule

b. Scan suspected messages and send alerts

c. Simulates a decoy with services

d. All of the above

Answer: c. Simulates a decoy with services


Q5. Which of the following are the Gartner’s seven cloud computing risks?

a. Regulatory compliance and audit

b. Data Location

c. Data Segregation

d. All of the above

Answer: d. All of the above


Q6. The _ amount of data that will be lost due to an interruption or disaster is defined in Recovery Point Objective

a. Minimum

b. Maximum

c. Average

d. None of these

Answer: b. Maximum


Q7. Which open source tools can be used to probe http and https port?

a. mmap

b. hping

c. wpget

d. All of the above

Answer: d. All of the above


Q8. Cloud-based collaboration can be

a. Federated

b. Loosely-coupled

c. All of the above

d. None of these

Answer: c. All of the above


Q9. Which of the following is an attack on integrity of data?

a. Interception

b. Modification

c. Interruption

d. Both a and b

Answer: b. Modification


Q10. Fabrication security attack is an attack on authenticity

a. True

b. False

Answer: a. True


Disclaimer: These answers are provided only for the purpose to help students to take references. This website does not claim any surety of 100% correct answers. So, this website urges you to complete your assignment yourself.


Also Available:

NPTEL Ethical Hacking Assignment 6 Answers

Cloud Computing NPTEL Assignment 7 Answers

Related Posts