Cloud Computing | NPTEL 2023 | Week 6 Assignment Solutions

Cloud Computing NPTEL assignment answers

This set of MCQ(multiple choice questions) focuses on the Cloud Computing NPTEL Week 6 Solutions.

Cloud computing is a scalable services consumption and delivery platform that provides on-demand computing service for shared pool of resources, namely servers, storage, networking, software, database, applications etc., over the Internet. It is a model for enabling ubiquitous, on-demand access to a shared pool of configurable computing resources, which can be rapidly provisioned and released with minimal management effort. This course will introduce various aspects of cloud computing, including fundamentals, management issues, security challenges and future research trends.

Course layout

Answers COMING SOON! Kindly Wait!

NOTE: You can check your answer immediately by clicking show answer button. Cloud Computing NPTEL Week 6 Solutions” contains 10 questions.

Now, start attempting the quiz.

Cloud Computing NPTEL Week 6 Solutions

Q1. Fabrication is an attack on:

a) Integrity
b) Confidentiality
c) Authenticity
d) Availability

Answer: c) Authenticity

Cloud Computing NPTEL Week 6 Solutions

Q2. Reliability and efficiency are basic components of security.

a) True
b) False

Answer: b) False

Q3. Spoofing threat on cloud security is an example of

a) Deception
b) Disruption
c) Usurpation
d) Disclosure

Answer: a), c)

Cloud Computing NPTEL Week 6 Solutions

Q4. Statement I: Intrusion Detection System (IDS) scans the incoming messages, and creates alerts when suspected scans/attacks are in progress.
Statement II: Authentication is the determination of whether or not an operation is allowed by a certain user.

a) Statement I is TRUE and Statement II is FALSE.
b) Statement II is TRUE and Statement I is FALSE.
c) Both statements are TRUE.
d) Both statements are FALSE.

Answer: a) Statement I is TRUE and Statement II is FALSE.

Q5. Which of the following is/are hypervisor risks associated with rough hypervisor root kits?

a) Improper configuration of VM.
b) Hypervisor that hides itself from normal malware detection systems.
c) Hypervisor that creates a covert channel to dump unauthorized code.
d) Vulnerable virtual machine applications like Vmchat, VMftp, Vmcat etc.

Answer: b), c)

Q6. In fault tolerance, replication is mirroring/sharing data over disks which are located in separate physical locations to maintain consistency.

a) True
b) False

Answer: a) True

Cloud Computing NPTEL Week 6 Solutions

Q7. In which of the following web service(s) based security attacks does(do) the attacker send huge amounts of requests to a certain service, causing denial of service?

a) Injection attack
b) Flooding
c) Cross-site scripting (XSS)
d) Metadata (WSDL) spoofing attack

Answer: b) Flooding

Q8. When is it better to switch cloud providers?

a) Contract price decrease
b) Provider bankruptcy
c) Provider service shutdown
d) Increase in service quality

Answer: b), c)

Q9. Which of the following Open-source tools is/are used to perform TCP SYN trace routes on the Amazon EC2 platform?

a) wget
b) nmap
c) ipconfig
d) hping

Answer: d) hping

Cloud Computing NPTEL Week 6 Solutions

Q10. In risk-based access control (RAC), computing security uncertainity is addressed.

a) True
b) False

Answer: b) False


Previous – Cloud Computing NPTEL Week 6 Solutions

Q1. Modification threat on cloud security is an example of:

a) Deception
b) Disclosure
c) Disruption
d) Usurpation

Answer: a), c), d)

Q2. Which of the following is/are example(s) of passive attack?

a) Replay
b) Denial of service
c) Traffic analysis
d) Masquerade

Answer: c) Traffic analysis

Q3. Interception is an attack on integrity

a) TRUE
b) FALSE

Answer: b) FALSE

Q4. Statement I: Intrusion Detection System(IDS) scans the incoming messages, and creates alerts when suspected scans/attacks are in progress.
Statement II: Authentication is the identification of legitimate users.

a) Statement I is TRUE and statement II is FALSE
b) Statement I is FALSE and statement II is TRUE.
c) Both statements are TRUE
d) Both statements are FALSE

Answer: c) Both statements are TRUE

Q5. Match the following

a) 1-(a), 2-(b), 3-(d)
b) 1-(c), 2-(a), 3-(d)
c) 1-(b), 2-(c), 3-(d)
d) 1-(a), 2-(c), 3-(d)

Answer: b) 1-(c), 2-(a), 3-(d)

Cloud Computing NPTEL week 6 Solutions

Q6. Recovery Time Objective (RTO) represents the period of time allowed for the complete execution of the task.

a) TRUE
b) FALSE

Answer: b) FALSE

Q7. The correct statement(s) for necessary and sufficient conditions for the detection of inheritance conflict is/are:

a) Sufficient condition: current entry role and at least one exit role forms conflicting pair
b) Sufficient condition: current entry role is senior to at least one exit role
c) Necessary condition: current entry role is senior to at least one exit role
d) Necessary condition: at least one exit role

Answer: b), d)

Cloud Computing NPTEL week 6 Solutions

Q8. Which of the following is/are hypervisor risks associated with VM escape?

a) Vulnerable virtual machine applications like Vmchat, VMftp, Vmcat etc,
b) Rogue hypervisor that hides itself from normal malware detection systems
c) Improper configuration of VM
d) Rogue hypervisor that creates a convert channel to dump unauthorized code

Answer: a), c)

Cloud Computing NPTEL week 6 Solutions

Q9. In fault tolerance, replication is the duplication of critical components of a system with the intention of increasing reliability of the system, usually in the case of a backup or fail-safe.

a) TRUE
b) FALSE

Answer: b) FALSE

Q10. Which of the following Open-source tools is/are used for retrieving web pages in Amazon EC2?

a) wget
b) hping
c) ifconfig
d) nmap

Answer: a) wget

Cloud Computing NPTEL week 6 Solutions

Previous Course – Cloud Computing NPTEL week 6 Solutions

Q1. In a cyber-attack, if one entity is pretending to be another one, then it is called.

a) Denial of Service
b) Replay
c) Masquerade
d) Modification

Answer: c) Masquerade

Cloud Computing NPTEL week 6 Solutions

Q2. Security responsibilities of a IaaS cloud service provider is typically upto

a) Guest OS
b) Application
c) Solution Stack
d) Hypervisor

Answer: d) Hypervisor

Q3. Which of the following security property ensures that subscriber can’t deny the action done by him/her.

a) Authorization
b) Non-repudiation
c) Confidentiality
d) Integrity

Answer: b) Non-repudiation

Cloud Computing NPTEL week 6 Solutions

Q4. What is honeypot?

a) Manages network traffic filtering rule
b) Scans suspected messages and send alerts
c) Simulates a decoy with services
d) All of the above

Answer: c) Simulates a decoy with services

Q5. Which of the following are the Gartner’s seven cloud computing risks?

a) Regulatory Compliance & Audit
b) Data Location
c) Data Segregation
d) All of the above

Answer: d) All of the above

Cloud Computing NPTEL week 6 Solutions

Q6. The ___________ amount of data that will be lost due to an interruption or disaster is defined in Recovery Point Objective

a) minimum
b) maximum
c) average
d) None of these

Answer: b) maximum

Q7. Which open source tools can be used to probe http and https port?

a) mmap
b) hping
c) wpget
d) All of the above

Answer: d) All of the above

Cloud Computing NPTEL week 6 Solutions

Q8. Cloud-based collaboration can be

a) Federated
b) Loosely-coupled
c) All of the above
d) None of these

Answer: c) All of the above

Cloud Computing NPTEL week 6 Solutions

Q9. Which of the following is an attack on integrity of data?

a) Interception
b) Modification
c) Interruption
d) Both a and b

Answer: b) Modification

Q10. Fabrication security attack is an attack on authenticity

a) True
b) False

Answer: a) True

Cloud Computing NPTEL week 6 Solutions

<< Prev- Cloud Computing Week 5 Assignment Solutions

>> Next- Cloud Computing Week 7 Assignment Solutions


DISCLAIMER: Use these answers only for the reference purpose. Quizermania doesn't claim these answers to be 100% correct. So, make sure you submit your assignments on the basis of your knowledge.

For discussion about any question, join the below comment section. And get the solution of your query. Also, try to share your thoughts about the topics covered in this particular quiz.

Leave a Comment

Your email address will not be published. Required fields are marked *