NPTEL - CC - Assignment 6 2022

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

TYPE OF QUESTION: MSQ

Number of questions: 10 Total mark: 10 X 1 = 10

QUESTION 1:
In a cyber-attack, if one entity is pretending to be another one, then it is called.
a) Denial of Service
b) Replay
c) Masquerade
d) Modification

Correct Answer: c
Detailed Solution: Masquerade is “one entity pretends to be a different entity”.

QUESTION 2:
Security responsibilities of a IaaS cloud service provider is typically upto
a) Guest OS
b) Application
c) Solution Stack
d) Hypervisor
Correct Answer: d
Detailed Solution: Security responsibilities of a IaaS cloud Service provider is typically upto
hypervisor.

QUESTION 3:
Which of the following security property ensures that subscriber can’t deny the action done by
him/her.
a) Authorization
b) Non-repudiation
c) Confidentiality
d) Integrity

Correct Answer: b
Detailed Solution: Non repudiation is able to trace what happened and prevent denial of action.
QUESTION 4:
What is honeypot?
a) Manages network traffic filtering rule
b) Scans suspected messages and send alerts
c) Simulates a decoy with services
d) All of the above

Correct Answer: c
Detailed Solution: Honeypot simulates a decoy of host or network with services to understand
the security loophole

QUESTION 5:
Which of the following are the Gartner’s seven cloud computing risks?
a) Regulatory Compliance & Audit
b) Data Location
c) Data Segregation
d) All of the above

Correct Answer: d
Detailed Solution: Refer slide no. 10 of Cloud-Security II.

QUESTION 6:
The ___________ amount of data that will be lost due to an interruption or disaster is defined in
Recovery Point Objective
a) minimum
b) maximum
c) average
d) None of these

Correct Answer: b
Detailed Solution: RTO defines the maximum amount of data that will be lost following an
interruption or disaster.
QUESTION 7:
Which open source tools can be used to probe http and https port?
a) mmap
b) hping
c) wpget
d) All of the above

Correct Answer: b
Detailed Solution: nmap, hping, wget are used to prove port 80 (http) and 443 (https)

QUESTION 8:
Cloud-based collaboration can be
a) Federated
b) Loosely-coupled
c) All of the above
d) None of these

Correct Answer: c
Detailed Solution: Cloud-based collaboration can be tightly-coupled or federated as well as
loosely-coupled.

QUESTION 9:
Which of the following is an attack on integrity of data?
a) Interception
b) Modification
c) Interruption
d) Both a and b

Correct Answer: b
Detailed Solution: Modification is an attack on integrity of data.

QUESTION 10:

Fabrication security attack is an attack on authenticity


a) True
b) False
Correct Answer: a
Detailed Solution: Fabrication security attack is an attack on authenticity.

************END***********

You might also like