NPTEL Cloud Computing Week 6 Assignment Answers 2022:- All the Answers are provided here to help the students as a reference, You must submit your assignment to your own knowledge.
What is Cloud Computing?
Cloud computing is a scalable services consumption and delivery platform that provides on-demand computing service for a shared pool of resources, namely servers, storage, networking, software, database, applications, etc, over the internet is a model for enabling ubiquitous, on-demand access to a shared pool of configurable computing resources, which can be rapidly provisioned and released with minimal management effort. This course will introduce various aspects of cloud computing, including fundamentals, management issues, security challenges, and future research trends. This will help students (both UG and PG levels) and researchers to use and explore cloud computing platforms.
CRITERIA TO GET A CERTIFICATE
Average assignment score = 25% of the average of best 8 assignments out of the total 12 assignments given in the course.
Exam score = 75% of the proctored certification exam score out of 100
Final score = Average assignment score + Exam score
YOU WILL BE ELIGIBLE FOR A CERTIFICATE ONLY IF THE AVERAGE ASSIGNMENT SCORE >=10/25 AND EXAM SCORE >= 30/75. If one of the 2 criteria is not met, you will not get the certificate even if the Final score >= 40/100.
Course Name | Answer |
NPTEL Cloud Computing Week 1 Assignment Answers 2022 | Click Here |
NPTEL Cloud Computing Week 2 Assignment Answers 2022 | Click Here |
NPTEL Cloud Computing Week 3 Assignment Answers 2022 | Click Here |
NPTEL Cloud Computing Week 4 Assignment Answers 2022 | Click Here |
NPTEL Cloud Computing Week 5 Assignment Answers 2022 | Click Here |
NPTEL Cloud Computing Week 6 Assignment Answers 2022 | Click Here |
NPTEL Cloud Computing Week 7 Assignment Answers 2022 | NA |
NPTEL Cloud Computing Week 8 Assignment Answers 2022 | NA |
NPTEL Cloud Computing Week 9 Assignment Answers 2022 | NA |
NPTEL Cloud Computing Week 10 Assignment Answers 2022 | NA |
NPTEL Cloud Computing Week 11 Assignment Answers 2022 | NA |
NPTEL Cloud Computing Week 12 Assignment Answers 2022 | NA |
NPTEL Cloud Computing Week 6 Assignment Answers 2022 {July-Dec}
1. Modification threat on cloud security is an example of
A. Deception
B. Disclosure
C. Disruption
D. Usurpation
Answer:- a, c, d
2. Which of the following is/are example(s) of passive attack?
A. Replay
B. Denial of service
C. Traffic analysis
D. Masquerade
Answer:- c
Answers will be Uploaded Shortly and it will be Notified on Telegram, So JOIN NOW
3. Interception is an attack on integrity
A. TRUE
B. FALSE
Answer:- b
4. Statement I: Intrusion Detection System (IDS) Scans the incoming messages, and creates alerts when suspected scans/attacks are in progress.
Statement ll: Authentication is the identification of legitimate users
A. Statement I is TRUE and statement II is FALSE
B. Statement l is FALSE and statement Il is TRUE.
C. Both statements are TRUE.
D. Both statements are FALSE.
Answer:- c
5.
Answer:- b
6. Recovery lime Objective (RIO) represents the period of time allowed for the complete execution pf the task.
A. TRUE
B. FALSE
Answer:- b
👇For Week 07 Assignment Answers👇
7. The corect statement(s) for necessary and sufficient conditions for the detectionof inheritance conflict is/are:
A. Sufficient condition: current entry role and at least one exit role forms conflicting pair
B. Sufficient condition: current entry role is senior to at least one exit role
C. Necessary condition: current entry role is senior to at least one exit role
D. Necessary condition: at least one exit role
Answer:- a, d
8. Which of the following is/are hypervisor risks assOCiated With VM escape?
A. Vulnerable virtual machine applications like Vmchat, VMíftp, Vmcat etc.
B. Rogue hypervisor that hides itself from normal malware detection systems
C. Improper configuration of VM
D. Rogue hypervisor that creates a covert channel to dump unauthorized code
Answer:- a, c
9. In fault tolerance, replication is the duplication of critical components of a system with the intention of increasing relability of the system, usually in the case of a backup or fail-sate.
A. TRUE
B. FALSE
Answer:- b
10. Which of the folloWing Open-source tools is/are used for retrieving web pages in Amazon EC2 platform?
A. Wget
B. hping
C. ifconfig
D. nmap
Answer:- a
For More NPTEL Answers:- CLICK HERE
Join Our Telegram:- CLICK HERE
NPTEL Cloud Computing Week 6 Assignment Answers 2022 {Jan-June}
Q1. In a cyber-attack, if one entity is pretending to be another one, then it is called.
a) Denial of Service
b) Replay
c) Masquerade
d) Modification
Answer:- c) Masquerade
👇FOR NEXT WEEK ASSIGNMENT ANSWERS👇
Q2. Security responsibilities of a IaaS cloud service provider is typically up to
a) Guest OS
b) Application
c) Solution Stack
d) Hypervisor
Answer: d) Hypervisor
Q3. Which of the following security property ensures that subscriber can’t deny the action done by him/her.
a) Authorization
b) Non-repudiation
c) Confidentiality
d) Integrity
Answer: b) Non-repudiation
Q4. What is honeypot?
a. Manages network traffic filtering rule
b. Scan suspected messages and send alerts
c. Simulates a decoy with services
d. All of the above
Answer: c. Simulates a decoy with services
Q5. Which of the following are the Gartner’s seven cloud computing risks?
a. Regulatory compliance and audit
b. Data Location
c. Data Segregation
d. All of the above
Answer: d. All of the above
Q6. The ___________ amount of data that will be lost due to an interruption or disaster is defined in Recovery Point Objective
a. Minimum
b. Maximum
c. Average
d. None of these
Answer:- b. Maximum
👇FOR NEXT WEEK ASSIGNMENT ANSWERS👇
Q7. Which open source tools can be used to probe http and https port?
a. mmap
b. hping
c. wpget
d. All of the above
Answer: d. All of the above
Q8. Cloud-based collaboration can be
a. Federated
b. Loosely-coupled
c. All of the above
d. None of these
Answer: c. All of the above
Q9. Which of the following is an attack on integrity of data?
a. Interception
b. Modification
c. Interruption
d. Both a and b
👉 If There Will be Any Changes in Answer, We will Notify On Telegram, So JOIN 👈
Answer: For Answer Click Here
Q10. Fabrication security attack is an attack on authenticity
a. True
b. False
Answer: a. True
Disclaimer:- We do not claim 100% surety of solutions, these solutions are based on our sole expertise, and by using posting these answers we are simply looking to help students as a reference, so we urge do your assignment on your own.
For More NPTEL Answers:- CLICK HERE
Join Our Telegram:- CLICK HERE
NPTEL Cloud Computing Week 6 Assignment Answers 2022:- All the Answers provided here to help the students as a reference, You must submit your assignment at your own knowledge.