Cloud Computing Week 6 NPTEL Assignment Answers 2025

NPTEL Cloud Computing Week 6 Assignment Answers 2024

Q1. Modification is an attack on:

  • A) Authenticity
  • B) Integrity
  • C) Confidentiality
  • D) Availability

Answer :- b
✏️ Explanation: Modification attacks alter data, which directly compromises integrity, i.e., the trustworthiness and accuracy of data.


Q2. Which of the following is/are examples of passive attack?

  • A) Replay
  • B) Denial of service
  • C) Traffic analysis
  • D) Masquerade

Answer :- c
✏️ Explanation: Traffic analysis is a passive attack that monitors communications without altering data. Others are active attacks.


Q3. Which of the following is/are the recovery goals of the security mechanism?

  • A) Prevent attackers from violating security policy
  • B) Detect attackers’ violation of security policy
  • C) Stop attack, assess and repair damage
  • D) Continue to function correctly even if attack succeeds

Answer :- c, d
✏️ Explanation: Recovery focuses on minimizing damage and maintaining operations, not prevention or detection (which are proactive goals).


Q4. Statement I: Authorization is the identification of legitimate users.

Statement II: Integrity is the protection against data alteration/corruption.**

  • A. Statement I is TRUE and statement II is FALSE
  • B. Statement I is FALSE and statement II is TRUE
  • C. Both statements are TRUE
  • D. Both statements are FALSE

Answer :- b
✏️ Explanation:

  • Statement I is FALSE: Authorization defines what a user can access, not identification.
  • Statement II is TRUE: Integrity ensures data isn’t altered.

Q5. Which of the following is/are hypervisor risks associated with rogue hypervisor rootkits?

  • A) Vulnerable virtual machine applications like Vmchat, VMftp, Vmcat etc.
  • B) Hypervisor that hides itself from normal malware detection systems
  • C) Improper configuration of VM.
  • D) Hypervisor that creates a covert channel to dump unauthorized code.

Answer :- b, d
✏️ Explanation: Rogue hypervisors hide from detection and leak data using covert channels, posing serious risks


[tutor_course id=”26198, 2954″ exclude_ids=”” category=”” orderby=”ID” order=”DESC” count=”6″]

Q7. Recovery Time Objective (RTO) represents the period of time allowed for the complete execution of the task.

  • A) TRUE
  • B) FALSE

Answer :- b
✏️ Explanation: RTO is the maximum acceptable downtime for a service after disruption, not the time to complete a task.


Q8. Which of the following Open-source tools is/are used to perform TCP connect probes on the Amazon EC2 platform?

  • A) nmap
  • B) wget
  • C) ipconfig
  • D) hping

Answer :- a
✏️ Explanation: nmap is widely used for TCP probing, port scanning, and network discovery including in cloud environments.


Q9. In para virtualization, VMs interact with the host OS.

  • A) TRUE
  • B) FALSE

Answer :- a
✏️ Explanation: Paravirtualization allows VMs to communicate with the host hypervisor/OS for better performance via modified guest OS.


Q10. In conflict removal, when is introduction of a virtual role required?

  • A) In case of violation of SoD constraint violation.
  • B) In case of cyclic inheritance conflict where exactly matched role set exists.
  • C) In case of cyclic inheritance conflict where no exactly matched role set exists.
  • D) None of the above.

Answer :- c
✏️ Explanation: When no matching role set exists and cyclic inheritance occurs, virtual roles help resolve access conflicts safely.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top