Cloud Computing NPTEL Week 6 Assignment

                     

Course name: Cloud Computing NPTEL

Link to Enroll: Click Here

These are solution of Cloud Computing NPTEL Week 6 Assignment


Q1. Modification threat on cloud security is an example of
A. Deception
B. Disclosure
C. Disruption
D. Usurpation

Answer: a, c, d


Q2. Which of the following is/are example(s) of passive attack?
A. Replay
B. Denial of service
C. Traffic analysis
D. Masquerade

Answer: c


Q3. Interception is an attack on integrity
A. TRUE
B. FALSE

Answer: b


These are solution of Cloud Computing NPTEL Week 6 Assignment


Q4. Statement I: Intrusion Detection System (IDS) Scans the incoming messages, and creates alerts when suspected scans/attacks are in progress.
Statement ll: Authentication is the identification of legitimate users

A. Statement I is TRUE and statement II is FALSE
B. Statement l is FALSE and statement Il is TRUE.
C. Both statements are TRUE.
D. Both statements are FALSE.

Answer: c


Q5.

These are solution of Cloud Computing NPTEL Week 6 Assignment
These are solution of Cloud Computing NPTEL Week 6 Assignment

Answer: b


Q6. Recovery lime Objective (RIO) represents the period of time allowed for the complete execution pf the task.
A. TRUE
B. FALSE

Answer: b


Q7. The correct statement(s) for necessary and sufficient conditions for the detectionof inheritance conflict is/are:
A. Sufficient condition: current entry role and at least one exit role forms conflicting pair
B. Sufficient condition: current entry role is senior to at least one exit role
C. Necessary condition: current entry role is senior to at least one exit role
D. Necessary condition: at least one exit role

Answer: a, d


These are solution of Cloud Computing NPTEL Week 6 Assignment


Q8. Which of the following is/are hypervisor risks assOCiated With VM escape?
A. Vulnerable virtual machine applications like Vmchat, VMíftp, Vmcat etc.
B. Rogue hypervisor that hides itself from normal malware detection systems
C. Improper configuration of VM
D. Rogue hypervisor that creates a covert channel to dump unauthorized code

Answer: a, c


Q9. In fault tolerance, replication is the duplication of critical components of a system with the intention of increasing relability of the system, usually in the case of a backup or fail-sate.
A. TRUE
B. FALSE

Answer: b


Q10. Which of the folloWing Open-source tools is/are used for retrieving web pages in Amazon EC2 platform?
A. Wget
B. hping
C. ifconfig
D. nmap

Answer: a


These are solution of Cloud Computing NPTEL Week 6 Assignment

All weeks of Cloud Computing: https://progies.in/answers/nptel/cloud-computing-nptel

More NPTEL course answers: https://progies.in/answers/nptel


* The material and content uploaded on this website are for general information and reference purposes only. Please do it by your own first.


These are solution of Cloud Computing NPTEL Week 6 Assignment