0% found this document useful (0 votes)
30 views1 page

IAT - QP Sample

This document outlines an internal assessment test for a course on Security and Privacy in Cloud within the Information Technology department. It includes sections for short answer questions, longer essay-type questions, and covers topics such as cloud security services, hash functions, digital signatures, obfuscation techniques, and virtualization strategies. The test is designed to evaluate students' understanding and application of key concepts in cloud security over a duration of 1.5 hours for a total of 50 marks.

Uploaded by

devi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views1 page

IAT - QP Sample

This document outlines an internal assessment test for a course on Security and Privacy in Cloud within the Information Technology department. It includes sections for short answer questions, longer essay-type questions, and covers topics such as cloud security services, hash functions, digital signatures, obfuscation techniques, and virtualization strategies. The test is designed to evaluate students' understanding and application of key concepts in cloud security over a duration of 1.5 hours for a total of 50 marks.

Uploaded by

devi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

INTERNAL ASSESSMENT TEST - 1

Department :INFORMATION TECHNOLOGY


Course Name : SECURITY AND PRIVACY IN CLOUD Year / SEM :III/VI
Course Code : CCS362 Date :
Duration : 1 ½ hours Marks : 50

Part – A (5 × 2 = 10 Marks)

Marks BTL CO

1 What are the security services provided by cloud? 2 1 1


What is hash function and how they are used in cloud 1
2 2 1
security?
What are digital signatures and how they are used in cloud 1
3 2 1
security?
4 What are the techniques used in obfuscation? 2 2 2
2
5 Define Certificate Authority. 2 2

Part – B (2×13 = 26 Marks)

a)

6 OR

b)

a)

7 OR

b)

Part - C (1 x 14 = 14 Marks)

a) Describe virtualization Strategies for cloud security. 14 6 2

8 OR

b) What are the key design principles for cloud computing? 14 6 2

BTL1 - Remembering, BTL2 - Understanding, BTL3 - Applying, BTL4 - Analysing, BTL5 - Evaluating, BTL6 - Creating

You might also like