Cloud Computing | Week 6
Cloud Computing week 6 Assignment 6 Answers
Course Link: https://onlinecourses.nptel.ac.in/noc23_cs89/preview
Q1. Fabrication is an attack on :
A) Integrity
B) Confidentiality
C) Authenticity
D) Availability
Q2. Reliability and efficiency are basic components of security.
A) True
B) False
Q3. Spoofing threat on cloud security is an example of.
A) Deception
B) Disruption
C) Usurpation
D) Disclosure
Q4. Statement I : Intrusion Detection System (IDS) scans the incoming messages, and creates alerts when suspected scans/attacks are in progress.
Statement II : Authentication is the determination of whether or not an operation is allowed by a certain user.
A) Statement Iis TRUE and Statement II is FALSE.
B) Statement II is TRUE and Statement I is FALSE.
C) Both statements are TRUE.
D) Both statements are FALSE.
Q5. Which of the following is/are hypervisor risks associated with rough hypervisor root kits?
A) Improper configuration of VM.
B) Hypervisor that hides itself from normal malware detection systems.
C) Hypervisor that creates a covert channel to dump unauthorized code.
D) Vulnerable virtual machine applications like Vmchat. VMftp. Vmcat etc.
Q6. In fault tolerance, replication is mirroring/sharing data over disks which are located in separate physical locations to maintain consistency.
A) True
B) False
Q7. In which of the following web service(s) based security attacks does(do) the attacker send huge amounts of requests to a certain service, causing denial of service?
A) Injection attack
B) Flooding
C) Cross-site scripting (XSS)
D) Metadata (WSDL) spoofing attack
Q8. When is it better to switch cloud providers?
A) Contract price decrease
B) Provider bankruptcy
C) Provider service shutdown
D) Increase in service quality
Q9. Which of the following Open-source tools is/are used to perform TCP SYN trace routes on the Amazon EC2 platform?
A) wget
B) nmap
C) ipconfig
D) hping
Q10. In risk-based access control (RAC), computing security uncertainty is addressed.
A) True
B) False