100% found this document useful (2 votes)
2K views4 pages

NPTEL CC Assignment 6

This document contains a 10 question multiple choice quiz on cloud computing and security. The questions cover topics like types of active security attacks, goals of security, passive attacks like traffic analysis, Gartner's seven cloud computing risks, recovery time objective (RTO), situations where it's better to switch cloud providers, differences between full and para virtualization, passive vs active attacks, and components of security. The questions are followed by the correct answers and short explanations or references to help understand the solutions.

Uploaded by

Arun Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
2K views4 pages

NPTEL CC Assignment 6

This document contains a 10 question multiple choice quiz on cloud computing and security. The questions cover topics like types of active security attacks, goals of security, passive attacks like traffic analysis, Gartner's seven cloud computing risks, recovery time objective (RTO), situations where it's better to switch cloud providers, differences between full and para virtualization, passive vs active attacks, and components of security. The questions are followed by the correct answers and short explanations or references to help understand the solutions.

Uploaded by

Arun Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

NPTEL Online Certification Courses

Indian Institute of Technology Kharagpur

Cloud Computing
Assignment- Week 6
TYPE OF QUESTION: MCQ/MSQ
[One or more options may be correct]

Number of questions: 10 Total mark: 10 X 1 = 10


_________________________________________________________________________________________________________

QUESTION 1:

I. Replay (A) Prevents the normal use of communication facilities.

II. Denial of service (B) Passive capture of a data unit and its subsequent retransmission to
produce an unauthorized effect.

III. Modification (C) Some portion of a legitimate message is altered.

IV. Masquerade (D) One entity pretends to be a different entity.

(a) I-A, II-C, III-B, IV-D


(b) I-C, II-A, III-B, IV-D
(c) I-B, II-A, III-C, IV-D
(d) I-D, II-B, III-A, IV-C

Correct Answer: c

Solution: Active attacks involve some modification of the data stream or the creation of a
false stream. These four are the four categories of active attacks. Refer slide no. 16 of Cloud-
Security I.

____________________________________________________________________________________________________
QUESTION 2:

Which of the following is/ are the goal(s) of security?


(a) Detect attackers’ violation of security policy
(b) Continue to function correctly even if attack succeeds
(c) Stop attack, assess and repair damage
(d) None of the above

Correct Answer: a, b, c

Solution: Refer slide no. 8 of Cloud-Security I.


____________________________________________________________________________________________________
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur

QUESTION 3:
Statement I: Release of message contents means that the opponent can determine the location and
identity of communicating hosts, and observe the frequency and length of messages being exchanged
Statement II: Traffic analysis is desirable to prevent the opponent from learning the contents of
the transmission.
Which of the options are correct?
(a) Statement I is TRUE and Statement II is FALSE
(b) Statement II is TRUE and Statement I is FALSE
(c) Both are TRUE
(d) Both are FALSE

Correct Answer: d

Solution: These are the types of passive attacks. Release of message contents:- It may be
desirable to prevent the opponent from learning the contents of the transmission. Traffic
analysis:- The opponent can determine the location and identity of communicating hosts,
and observe the frequency and length of messages being exchanged.
____________________________________________________________________________________________________
QUESTION 4:

Modification security attack is an attack on Integrity

(a) TRUE
(b) FALSE

Correct Answer: a

Solution: Modification security attack is attack on integrity.

__________________________________________________________________________________________________

QUESTION 5:
Which of the following are the Gartner’s seven cloud computing risks?

(a) Regulatory Compliance & Audit


(b) Data Location
(c) Data Segregation
(d) Short-term Viability

Correct Answer: a, b, c

Solution: Refer slide no. 10 of Cloud-Security II.


__________________________________________________________________________________________________
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur

QUESTION 6:
Recovery Time Objective (RTO) represents:
(a) The maximum amount of data that will be lost following an interruption or
disaster.
(b) The period of time allowed for recovery
(c) The period of time allowed for the complete execution
(d) The maximum period of time allowed for the compilation of the programme

Correct Answer: b

Solution: Recovery Time Objective (RTO): The period of time allowed for recovery i.e.,
the time that is allowed to elapse between the disaster and the activation of the secondary
site.
____________________________________________________________________________________________________

QUESTION 7:

In which situation it is better to switch cloud providers?


(a) Contract price decrease
(b) Provider bankruptcy
(c) Provider service shutdown
(d) Business dispute

Correct Answer: b, c, d

Solution: Refer slide no. 17 of Cloud-Security II.


____________________________________________________________________________________________________

QUESTION 8:
In full-virtualization, VMs run on hypervisor that interacts with the hardware
a) True
b) False

Correct Answer: a

Solution: Full virtualization: VMs run on hypervisor that interacts with the hardware,
and Para virtualization: VMs interact with the host OS.

____________________________________________________________________________________________________
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur

QUESTION 9:

Choose the option(s) which is/are not a passive attack?


a) Traffic Analysis
b) Release of message contents
c) Denial of service
d) Replay

Correct Answer: c, d

Solution: A passive attack is a network attack in which a system is monitored and


sometimes scanned for open ports and vulnerabilities. The purpose is solely to gain
information about the target and no data is changed on the target.

____________________________________________________________________________________________________

QUESTION 10:

Reliability and Efficiency are basic components of security

(a) TRUE
(b) FALSE

Correct Answer: b

Solution: Confidentiality (Keeping data and resources hidden), Integrity and Availability
(Enabling access to data and resources) are the major components of security.

************END*******

You might also like