GRT Institute of Engineering and Technology,: Tiruttani
GRT Institute of Engineering and Technology,: Tiruttani
24
REG.NO.
GRT INSTITUTE OF
ENGINEERING AND
TECHNOLOGY, Tiruttani
(An Autonomous Institution)
Accredited by NBA (ECE), NAAC with “A++” Grade &An ISO 9001:2015 Certified Institution
Approved by AICTE, New Delhi& Affiliated to Anna University, Chennai.
A) Integrity
2 B) Confidentiality B 2
C) Authentication
D) Non-repudiation
A) Encrypt data
B) Decrypt data
5 C) Generate a unique fixed-size output from variable- C 2
sized input
D) Generate encryption keys
A) Passwords
B) Digital signatures
6 C) Biometrics B 2
D) Security questions
A) Encrypt data
7 B) Verify the authenticity of a message or document B 2
C) Provide confidentiality
D) Control access
A) Confidentiality
9 B) Authentication C 2
C) Integrity
D) Non-repudiation
UNIT II
Q.NO ANSWER ALL QUESTIONS (10x2) =20 Marks OPTION MARKS
What is the primary goal of security design principles in cloud
computing?
A) Data encryption
2 B) Network bandwidth management A 2
C) Load balancing
D) Data visualization
A) Performance bottlenecks
B) Denial of Service (DoS) attacks
C) User interface bugs
D) Data redundancy
What is a key strategy to ensure network and storage security
in the cloud?
9 A) Data encryption D 2
B) Data retention
C) Data archiving
D) Data deletion
UNIT-III
Q.NO ANSWER ALL QUESTIONS (10x2) =20 Marks OPTION MARKS
Which of the following is NOT a common factor used in
Multi-Factor Authentication (MFA)?
A) User preferences
2 B) User roles within an organization B 2
C) Network performance
D) User physical locations
A) Data redundancy
5 B) Assigning permissions to access data storage B 2
resources
C) Optimizing data transfer speeds
D) Reducing data storage costs
UNIT IV
Q.NO ANSWER ALL QUESTIONS (10x2) =20 Marks OPTION MARKS
Which cloud deployment model is typically used for cloud
bursting?
A) Private Cloud
1 B) Public Cloud C 2
C) Hybrid Cloud
D) Community Cloud
A) User preferences
2 B) Geographical location information B 2
C) Encryption keys
D) Network latency details
A) HTTP
3 B) FTP D 2
C) SMTP
D) HTTPS
A) Public Wi-Fi
5 B) Unsecured VPNs C 2
C) Corporate firewalls
D) Open networks
A) Encrypting data
8 B) Masking sensitive information B 2
C) Compressing data files
D) Enhancing data retrieval speeds
A) Data compression
9 B) User interface design C 2
C) Encryption and digital signatures
D) Network load balancing
UNIT V
OPTIO
Q.NO ANSWER ALL QUESTIONS (10x2) =20 Marks MARKS
N
What is the main purpose of proactive activity monitoring in
cloud security?
Which of the following is an example of malicious traffic that should be monitored in a cloud envir
9
A) Optimizing data compression B 2
B) Ensuring secure administrative access and controls
C) Increasing network bandwidth
D) Enhancing user interface design