NPTEL Cloud Computing Week 6 Assignment Answers

Join Our WhatsApp Group Join Now
Join Us On Telegram Join Now

NPTEL Cloud Computing Week 6 Assignment Solutions

NPTEL Cloud Computing Assignment 1 Answers 2023

NPTEL Cloud Computing Week 6 Assignment Answers 2023

1. Fabrication is an attack on:

A) Integrity
B) Confidentiality
C) Authenticity
D) Availability

Answer :- For Answer Click Here

2. Reliability and efficiency are basic components of security.
A) True
B) False

Answer :- For Answer Click Here

3. Spoofing threat on cloud security is an example of.
A Deception
B) Disruption
C) Usurpation
D) Disclosure

Answer :- For Answer Click Here

4. Statement I: Intrusion Detection System (IDS scans the incoming messages, and creates alerts when suspected scans attacks are in progress.
Statement II: Authentication is the determination of whether or not an operation is allowed by a certain user.

A) Statement Iis TRUE and Statement I is FALSE.
B) Statement II is TRUE and Statement I is FALSE.
C) Both statements are TRUE.
D) Both statements are FALSE.

Answer :- For Answer Click Here

5. Which of the following is are hypervisor risks associated with rough hypervisor root kits?
A) Improper configuration of VM.
B) Hypervisor that hides itself from normal malware detection systems.
C) Hypervisor that creates a covert channel to dump unauthorized code.
D) Vulnerable virtual machine applications like Vmchat, VMftip. Vmcat etc.

Answer :- For Answer Click Here

6. In fault tolerance, replication is mirroring sharing data over disks which are located in separate physical locations to maintain consistency.
A) True
B) False

Answer :- For Answer Click Here

7. In which of the following web service(s) based security attacks does(do) the attacker send huge amounts of requests to a certain service, causing denial of service?
A) Iniection attack
B) Flooding
C) Cross-site scripting (XSS)
D) Metadata (WSDL) spoofing attack

Answer :- For Answer Click Here

8. When is it better to switch cloud providers?
A) Contract price decrease
B) Provider bankruptcy
C) Provider service shutdown
D) Increase in service quality

Answer :- For Answer Click Here

9. Which of the following Open-source tools is/are used to perform TCP SYN trace routes on the Amazon EC2 platform?
A) wget
B) map
C) ipconfig
D) hping

Answer :-For Answer Click Here

10. In risk-based access control (RAC), computing security uncertainty is addressed.
A) True
B) False

Answer :- For Answer Click Here
Course NameCloud Computing
CategoryNPTEL Assignment Answer
Home Click Here
Join Us on TelegramClick Here

Leave a comment