NPTEL Cloud Computing Week 6 Assignment Solutions
NPTEL Cloud Computing Week 6 Assignment Answers 2023
1. Fabrication is an attack on:
A) Integrity
B) Confidentiality
C) Authenticity
D) Availability
Answer :- For Answer Click Here
2. Reliability and efficiency are basic components of security.
A) True
B) False
Answer :- For Answer Click Here
3. Spoofing threat on cloud security is an example of.
A Deception
B) Disruption
C) Usurpation
D) Disclosure
Answer :- For Answer Click Here
4. Statement I: Intrusion Detection System (IDS scans the incoming messages, and creates alerts when suspected scans attacks are in progress.
Statement II: Authentication is the determination of whether or not an operation is allowed by a certain user.
A) Statement Iis TRUE and Statement I is FALSE.
B) Statement II is TRUE and Statement I is FALSE.
C) Both statements are TRUE.
D) Both statements are FALSE.
Answer :- For Answer Click Here
5. Which of the following is are hypervisor risks associated with rough hypervisor root kits?
A) Improper configuration of VM.
B) Hypervisor that hides itself from normal malware detection systems.
C) Hypervisor that creates a covert channel to dump unauthorized code.
D) Vulnerable virtual machine applications like Vmchat, VMftip. Vmcat etc.
Answer :- For Answer Click Here
6. In fault tolerance, replication is mirroring sharing data over disks which are located in separate physical locations to maintain consistency.
A) True
B) False
Answer :- For Answer Click Here
7. In which of the following web service(s) based security attacks does(do) the attacker send huge amounts of requests to a certain service, causing denial of service?
A) Iniection attack
B) Flooding
C) Cross-site scripting (XSS)
D) Metadata (WSDL) spoofing attack
Answer :- For Answer Click Here
8. When is it better to switch cloud providers?
A) Contract price decrease
B) Provider bankruptcy
C) Provider service shutdown
D) Increase in service quality
Answer :- For Answer Click Here
9. Which of the following Open-source tools is/are used to perform TCP SYN trace routes on the Amazon EC2 platform?
A) wget
B) map
C) ipconfig
D) hping
Answer :-For Answer Click Here
10. In risk-based access control (RAC), computing security uncertainty is addressed.
A) True
B) False
Answer :- For Answer Click Here
Course Name | Cloud Computing |
Category | NPTEL Assignment Answer |
Home | Click Here |
Join Us on Telegram | Click Here |