NPTEL Cloud Computing Week 6 Assignment Answers 2024
Q1. Modification is an attack on:
- A) Authenticity
- B) Integrity
- C) Confidentiality
- D) Availability
✅ Answer :- b
✏️ Explanation: Modification attacks alter data, which directly compromises integrity, i.e., the trustworthiness and accuracy of data.
Q2. Which of the following is/are examples of passive attack?
- A) Replay
- B) Denial of service
- C) Traffic analysis
- D) Masquerade
✅ Answer :- c
✏️ Explanation: Traffic analysis is a passive attack that monitors communications without altering data. Others are active attacks.
Q3. Which of the following is/are the recovery goals of the security mechanism?
- A) Prevent attackers from violating security policy
- B) Detect attackers’ violation of security policy
- C) Stop attack, assess and repair damage
- D) Continue to function correctly even if attack succeeds
✅ Answer :- c, d
✏️ Explanation: Recovery focuses on minimizing damage and maintaining operations, not prevention or detection (which are proactive goals).
Q4. Statement I: Authorization is the identification of legitimate users.
Statement II: Integrity is the protection against data alteration/corruption.**
- A. Statement I is TRUE and statement II is FALSE
- B. Statement I is FALSE and statement II is TRUE
- C. Both statements are TRUE
- D. Both statements are FALSE
✅ Answer :- b
✏️ Explanation:
- Statement I is FALSE: Authorization defines what a user can access, not identification.
- Statement II is TRUE: Integrity ensures data isn’t altered.
Q5. Which of the following is/are hypervisor risks associated with rogue hypervisor rootkits?
- A) Vulnerable virtual machine applications like Vmchat, VMftp, Vmcat etc.
- B) Hypervisor that hides itself from normal malware detection systems
- C) Improper configuration of VM.
- D) Hypervisor that creates a covert channel to dump unauthorized code.
✅ Answer :- b, d
✏️ Explanation: Rogue hypervisors hide from detection and leak data using covert channels, posing serious risks
[tutor_course id=”26198, 2954″ exclude_ids=”” category=”” orderby=”ID” order=”DESC” count=”6″]
Q7. Recovery Time Objective (RTO) represents the period of time allowed for the complete execution of the task.
- A) TRUE
- B) FALSE
✅ Answer :- b
✏️ Explanation: RTO is the maximum acceptable downtime for a service after disruption, not the time to complete a task.
Q8. Which of the following Open-source tools is/are used to perform TCP connect probes on the Amazon EC2 platform?
- A) nmap
- B) wget
- C) ipconfig
- D) hping
✅ Answer :- a
✏️ Explanation: nmap is widely used for TCP probing, port scanning, and network discovery including in cloud environments.
Q9. In para virtualization, VMs interact with the host OS.
- A) TRUE
- B) FALSE
✅ Answer :- a
✏️ Explanation: Paravirtualization allows VMs to communicate with the host hypervisor/OS for better performance via modified guest OS.
Q10. In conflict removal, when is introduction of a virtual role required?
- A) In case of violation of SoD constraint violation.
- B) In case of cyclic inheritance conflict where exactly matched role set exists.
- C) In case of cyclic inheritance conflict where no exactly matched role set exists.
- D) None of the above.
✅ Answer :- c
✏️ Explanation: When no matching role set exists and cyclic inheritance occurs, virtual roles help resolve access conflicts safely.


