0% found this document useful (0 votes)
171 views

Assignment 6 Solution

Uploaded by

Sri Santhosh
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
171 views

Assignment 6 Solution

Uploaded by

Sri Santhosh
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

NPTEL Online Certification Courses

Indian Institute of Technology Kharagpur

Cloud Computing
Assignment- Week 6
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10

QUESTION 1:
Modification is an attack on:
A) Authenticity
B) Integrity
C) Confidentiality
D) Availability
Correct Option: B
Detailed Solution: Modification is an attack on integrity.

QUESTION 2:
Which of the following is/are example(s) of passive attack?
A) Replay
B) Denial of service
C) Traffic analysis
D) Masquerade
Correct Option: C
Detailed Solution: Traffic analysis is an example of passive attack.

QUESTION 3:
Which of the following is/are the recovery goal(s) of the security mechanism?
A) Prevent attackers from violating security policy
B) Detect attackers’ violation of security policy
C) Stop attack, assess and repair damage
D) Continue to function correctly even if attack succeeds
Correct Option: C, D
Detailed Solution: Refer slide no. 8 of Cloud-Security I.

QUESTION 4:
Statement I: Authorization is the identification of legitimate users.
Statement II: Integrity is the protection against data alteration/corruption.
NPTEL Online Certification Courses

Indian Institute of Technology Kharagpur

A. Statement I is TRUE and statement II is FALSE.


B. Statement I is FALSE and statement II is TRUE.
C. Both statements are TRUE.
D. Both statements are FALSE.
Correct Option: B
Detailed Solution: Refer slide no. 18 of Cloud-Security I. Authorization is the determination of
whether or not an operation is allowed by a certain user. Integrity is the protection against data
alteration/corruption. So the first statement is false and the second statement is true.

QUESTION 5:
Which of the following is/are hypervisor risks associated with rogue hypervisor rootkits?

A) Vulnerable virtual machine applications like Vmchat, VMftp, Vmcat etc.


B) Hypervisor that hides itself from normal malware detection systems
C) Improper configuration of VM.
D) Hypervisor that creates a covert channel to dump unauthorized code.

Correct Answer: B, D
Detailed Solution: Hypervisor risks associated with rogue hypervisor rootkits include hypervisors
that hide themselves from normal malware detection systems, and hypervisors that create a covert
channel to dump unauthorized code.

QUESTION 6:

1. Injection attack (a) Attacker sending huge amounts of requests to a


certain service and causing denial of service.

2. Flooding (b) Browser-based security issues.

3. Metadata (WSDL) spoofing (c) Introduce malicious code to change the course of
attack execution.

(d) Malicious reengineering of Web Services’


metadata description.

A) 1-(a), 2-(b), 3-(d)


B) 1-(c), 2-(a), 3-(d)
C) 1-(b), 2-(c), 3-(d)
D) 1-(a), 2-(c), 3-(d)
NPTEL Online Certification Courses

Indian Institute of Technology Kharagpur

Correct Option: B
Detailed Solution: The following are web service based attacks. Refer to slide 23 of Cloud
Security-II.

QUESTION 7:
Recovery Time Objective (RTO) represents the period of time allowed for the complete execution
of the task.
A) TRUE
B) FALSE
Correct Option: B
Detailed Solution: Recovery Time Objective (RTO) represents the period of time allowed for
recovery i.e., the time that is allowed to elapse between the disaster and the activation of the
secondary site.

QUESTION 8:
Which of the following Open-source tools is/are used to perform TCP connect probes on the
Amazon EC2 platform?

A) nmap
B) wget
C) ipconfig
D) hping

Correct Option: A

Detailed Solution: nmap is used to perform TCP connect probes (attempt to complete a 3-way
hand-shake between a source and target). Refer to slide 12 of Cloud Security III.

QUESTION 9:
In para virtualization, VMs interact with the host OS.
A) TRUE
B) FALSE
Correct Option: A
Detailed Solution: The statement is true. Refer page 19 of Cloud Security-II.

QUESTION 10:
In conflict removal, when is introduction of a virtual role required?

A) In case of violation of SoD constraint violation.


NPTEL Online Certification Courses

Indian Institute of Technology Kharagpur

B) In case of cyclic inheritance conflict where exactly matched role set exists.
C) In case of cyclic inheritance conflict where no exactly matched role set exists.
D) None of the above.

Correct Option: C
Detailed Solution: Refer page 27 of Cloud Security-III on conflict removal.

You might also like