This set of MCQ(multiple choice questions) focuses on the Cloud Computing NPTEL Week 6 Solutions.
Cloud computing is a scalable services consumption and delivery platform that provides on-demand computing service for shared pool of resources, namely servers, storage, networking, software, database, applications etc., over the Internet. It is a model for enabling ubiquitous, on-demand access to a shared pool of configurable computing resources, which can be rapidly provisioned and released with minimal management effort. This course will introduce various aspects of cloud computing, including fundamentals, management issues, security challenges and future research trends.
Course layout
Answers COMING SOON! Kindly Wait!
Week 0: Assignment answers
Week 1:Â Introduction to Cloud Computing
Week 2: Cloud Computing Architecture
Week 3: Service Management in Cloud Computing
Week 4: Data Management in Cloud Computing
Week 5:Â Resource Management in Cloud
Week 6: Cloud Security
Week 7:Â Open Source and Commercial Clouds, Cloud Simulator
Week 8:Â Research trend in Cloud Computing, Fog Computing
Week 9:Â VM Resource Allocation, Management and Monitoring
Week 10:Â Cloud-Fog-Edge enabled Analytics
Week 11: Serverless Computing and FaaS Model
Week 12: Case Studies and Recent Advancements
NOTE: You can check your answer immediately by clicking show answer button. Cloud Computing NPTEL Week 6 Solutions” contains 10 questions.
Now, start attempting the quiz.
Cloud Computing NPTEL Week 6 Solutions
Q1. Fabrication is an attack on:
a) Integrity
b) Confidentiality
c) Authenticity
d) Availability
Answer: c) Authenticity
Q2. Reliability and efficiency are basic components of security.
a) True
b) False
Answer: b) False
Q3. Spoofing threat on cloud security is an example of
a) Deception
b) Disruption
c) Usurpation
d) Disclosure
Answer: a), c)
Q4. Statement I: Intrusion Detection System (IDS) scans the incoming messages, and creates alerts when suspected scans/attacks are in progress.
Statement II: Authentication is the determination of whether or not an operation is allowed by a certain user.
a) Statement I is TRUE and Statement II is FALSE.
b) Statement II is TRUE and Statement I is FALSE.
c) Both statements are TRUE.
d) Both statements are FALSE.
Answer: a) Statement I is TRUE and Statement II is FALSE.
Q5. Which of the following is/are hypervisor risks associated with rough hypervisor root kits?
a) Improper configuration of VM.
b) Hypervisor that hides itself from normal malware detection systems.
c) Hypervisor that creates a covert channel to dump unauthorized code.
d) Vulnerable virtual machine applications like Vmchat, VMftp, Vmcat etc.
Answer: b), c)
Q6. In fault tolerance, replication is mirroring/sharing data over disks which are located in separate physical locations to maintain consistency.
a) True
b) False
Answer: a) True
Q7. In which of the following web service(s) based security attacks does(do) the attacker send huge amounts of requests to a certain service, causing denial of service?
a) Injection attack
b) Flooding
c) Cross-site scripting (XSS)
d) Metadata (WSDL) spoofing attack
Answer: b) Flooding
Q8. When is it better to switch cloud providers?
a) Contract price decrease
b) Provider bankruptcy
c) Provider service shutdown
d) Increase in service quality
Answer: b), c)
Q9. Which of the following Open-source tools is/are used to perform TCP SYN trace routes on the Amazon EC2 platform?
a) wget
b) nmap
c) ipconfig
d) hping
Answer: d) hping
Q10. In risk-based access control (RAC), computing security uncertainity is addressed.
a) True
b) False
Answer: b) False
Previous – Cloud Computing NPTEL Week 6 Solutions
Q1. Modification threat on cloud security is an example of:
a) Deception
b) Disclosure
c) Disruption
d) Usurpation
Answer: a), c), d)
Q2. Which of the following is/are example(s) of passive attack?
a) Replay
b) Denial of service
c) Traffic analysis
d) Masquerade
Answer: c) Traffic analysis
Q3. Interception is an attack on integrity
a) TRUE
b) FALSE
Answer: b) FALSE
Q4. Statement I: Intrusion Detection System(IDS) scans the incoming messages, and creates alerts when suspected scans/attacks are in progress.
Statement II: Authentication is the identification of legitimate users.
a) Statement I is TRUE and statement II is FALSE
b) Statement I is FALSE and statement II is TRUE.
c) Both statements are TRUE
d) Both statements are FALSE
Answer: c) Both statements are TRUE
Q5. Match the following
a) 1-(a), 2-(b), 3-(d)
b) 1-(c), 2-(a), 3-(d)
c) 1-(b), 2-(c), 3-(d)
d) 1-(a), 2-(c), 3-(d)
Answer: b) 1-(c), 2-(a), 3-(d)
Q6. Recovery Time Objective (RTO) represents the period of time allowed for the complete execution of the task.
a) TRUE
b) FALSE
Answer: b) FALSE
Q7. The correct statement(s) for necessary and sufficient conditions for the detection of inheritance conflict is/are:
a) Sufficient condition: current entry role and at least one exit role forms conflicting pair
b) Sufficient condition: current entry role is senior to at least one exit role
c) Necessary condition: current entry role is senior to at least one exit role
d) Necessary condition: at least one exit role
Answer: b), d)
Q8. Which of the following is/are hypervisor risks associated with VM escape?
a) Vulnerable virtual machine applications like Vmchat, VMftp, Vmcat etc,
b) Rogue hypervisor that hides itself from normal malware detection systems
c) Improper configuration of VM
d) Rogue hypervisor that creates a convert channel to dump unauthorized code
Answer: a), c)
Q9. In fault tolerance, replication is the duplication of critical components of a system with the intention of increasing reliability of the system, usually in the case of a backup or fail-safe.
a) TRUE
b) FALSE
Answer: b) FALSE
Q10. Which of the following Open-source tools is/are used for retrieving web pages in Amazon EC2?
a) wget
b) hping
c) ifconfig
d) nmap
Answer: a) wget
Previous Course – Cloud Computing NPTEL week 6 Solutions
Q1. In a cyber-attack, if one entity is pretending to be another one, then it is called.
a) Denial of Service
b) Replay
c) Masquerade
d) Modification
Answer: c) Masquerade
Q2. Security responsibilities of a IaaS cloud service provider is typically upto
a) Guest OS
b) Application
c) Solution Stack
d) Hypervisor
Answer: d) Hypervisor
Q3. Which of the following security property ensures that subscriber can’t deny the action done by him/her.
a) Authorization
b) Non-repudiation
c) Confidentiality
d) Integrity
Answer: b) Non-repudiation
Q4. What is honeypot?
a) Manages network traffic filtering rule
b) Scans suspected messages and send alerts
c) Simulates a decoy with services
d) All of the above
Answer: c) Simulates a decoy with services
Q5. Which of the following are the Gartner’s seven cloud computing risks?
a) Regulatory Compliance & Audit
b) Data Location
c) Data Segregation
d) All of the above
Answer: d) All of the above
Q6. The ___________ amount of data that will be lost due to an interruption or disaster is defined in Recovery Point Objective
a) minimum
b) maximum
c) average
d) None of these
Answer: b) maximum
Q7. Which open source tools can be used to probe http and https port?
a) mmap
b) hping
c) wpget
d) All of the above
Answer: d) All of the above
Q8. Cloud-based collaboration can be
a) Federated
b) Loosely-coupled
c) All of the above
d) None of these
Answer: c) All of the above
Q9. Which of the following is an attack on integrity of data?
a) Interception
b) Modification
c) Interruption
d) Both a and b
Answer: b) Modification
Q10. Fabrication security attack is an attack on authenticity
a) True
b) False
Answer: a) True
<< Prev- Cloud Computing Week 5 Assignment Solutions
>> Next- Cloud Computing Week 7 Assignment Solutions
DISCLAIMER: Use these answers only for the reference purpose. Quizermania doesn't claim these answers to be 100% correct. So, make sure you submit your assignments on the basis of your knowledge.
For discussion about any question, join the below comment section. And get the solution of your query. Also, try to share your thoughts about the topics covered in this particular quiz.