Assignment 6 Solution
Assignment 6 Solution
Cloud Computing
Assignment- Week 6
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10
QUESTION 1:
Modification is an attack on:
A) Authenticity
B) Integrity
C) Confidentiality
D) Availability
Correct Option: B
Detailed Solution: Modification is an attack on integrity.
QUESTION 2:
Which of the following is/are example(s) of passive attack?
A) Replay
B) Denial of service
C) Traffic analysis
D) Masquerade
Correct Option: C
Detailed Solution: Traffic analysis is an example of passive attack.
QUESTION 3:
Which of the following is/are the recovery goal(s) of the security mechanism?
A) Prevent attackers from violating security policy
B) Detect attackers’ violation of security policy
C) Stop attack, assess and repair damage
D) Continue to function correctly even if attack succeeds
Correct Option: C, D
Detailed Solution: Refer slide no. 8 of Cloud-Security I.
QUESTION 4:
Statement I: Authorization is the identification of legitimate users.
Statement II: Integrity is the protection against data alteration/corruption.
NPTEL Online Certification Courses
QUESTION 5:
Which of the following is/are hypervisor risks associated with rogue hypervisor rootkits?
Correct Answer: B, D
Detailed Solution: Hypervisor risks associated with rogue hypervisor rootkits include hypervisors
that hide themselves from normal malware detection systems, and hypervisors that create a covert
channel to dump unauthorized code.
QUESTION 6:
3. Metadata (WSDL) spoofing (c) Introduce malicious code to change the course of
attack execution.
Correct Option: B
Detailed Solution: The following are web service based attacks. Refer to slide 23 of Cloud
Security-II.
QUESTION 7:
Recovery Time Objective (RTO) represents the period of time allowed for the complete execution
of the task.
A) TRUE
B) FALSE
Correct Option: B
Detailed Solution: Recovery Time Objective (RTO) represents the period of time allowed for
recovery i.e., the time that is allowed to elapse between the disaster and the activation of the
secondary site.
QUESTION 8:
Which of the following Open-source tools is/are used to perform TCP connect probes on the
Amazon EC2 platform?
A) nmap
B) wget
C) ipconfig
D) hping
Correct Option: A
Detailed Solution: nmap is used to perform TCP connect probes (attempt to complete a 3-way
hand-shake between a source and target). Refer to slide 12 of Cloud Security III.
QUESTION 9:
In para virtualization, VMs interact with the host OS.
A) TRUE
B) FALSE
Correct Option: A
Detailed Solution: The statement is true. Refer page 19 of Cloud Security-II.
QUESTION 10:
In conflict removal, when is introduction of a virtual role required?
B) In case of cyclic inheritance conflict where exactly matched role set exists.
C) In case of cyclic inheritance conflict where no exactly matched role set exists.
D) None of the above.
Correct Option: C
Detailed Solution: Refer page 27 of Cloud Security-III on conflict removal.