NPTEL - CC - Assignment 6 2022
NPTEL - CC - Assignment 6 2022
NPTEL - CC - Assignment 6 2022
QUESTION 1:
In a cyber-attack, if one entity is pretending to be another one, then it is called.
a) Denial of Service
b) Replay
c) Masquerade
d) Modification
Correct Answer: c
Detailed Solution: Masquerade is “one entity pretends to be a different entity”.
QUESTION 2:
Security responsibilities of a IaaS cloud service provider is typically upto
a) Guest OS
b) Application
c) Solution Stack
d) Hypervisor
Correct Answer: d
Detailed Solution: Security responsibilities of a IaaS cloud Service provider is typically upto
hypervisor.
QUESTION 3:
Which of the following security property ensures that subscriber can’t deny the action done by
him/her.
a) Authorization
b) Non-repudiation
c) Confidentiality
d) Integrity
Correct Answer: b
Detailed Solution: Non repudiation is able to trace what happened and prevent denial of action.
QUESTION 4:
What is honeypot?
a) Manages network traffic filtering rule
b) Scans suspected messages and send alerts
c) Simulates a decoy with services
d) All of the above
Correct Answer: c
Detailed Solution: Honeypot simulates a decoy of host or network with services to understand
the security loophole
QUESTION 5:
Which of the following are the Gartner’s seven cloud computing risks?
a) Regulatory Compliance & Audit
b) Data Location
c) Data Segregation
d) All of the above
Correct Answer: d
Detailed Solution: Refer slide no. 10 of Cloud-Security II.
QUESTION 6:
The ___________ amount of data that will be lost due to an interruption or disaster is defined in
Recovery Point Objective
a) minimum
b) maximum
c) average
d) None of these
Correct Answer: b
Detailed Solution: RTO defines the maximum amount of data that will be lost following an
interruption or disaster.
QUESTION 7:
Which open source tools can be used to probe http and https port?
a) mmap
b) hping
c) wpget
d) All of the above
Correct Answer: b
Detailed Solution: nmap, hping, wget are used to prove port 80 (http) and 443 (https)
QUESTION 8:
Cloud-based collaboration can be
a) Federated
b) Loosely-coupled
c) All of the above
d) None of these
Correct Answer: c
Detailed Solution: Cloud-based collaboration can be tightly-coupled or federated as well as
loosely-coupled.
QUESTION 9:
Which of the following is an attack on integrity of data?
a) Interception
b) Modification
c) Interruption
d) Both a and b
Correct Answer: b
Detailed Solution: Modification is an attack on integrity of data.
QUESTION 10:
************END***********