Cloud Computing Week 6 NPTEL Assignment Answers 2025

NPTEL Cloud Computing Week 6 Assignment Answers 2024

Q1. Modification is an attack on:

  • A) Authenticity
  • B) Integrity
  • C) Confidentiality
  • D) Availability

Answer :- b
✏️ Explanation: Modification attacks alter data, which directly compromises integrity, i.e., the trustworthiness and accuracy of data.


Q2. Which of the following is/are examples of passive attack?

  • A) Replay
  • B) Denial of service
  • C) Traffic analysis
  • D) Masquerade

Answer :- c
✏️ Explanation: Traffic analysis is a passive attack that monitors communications without altering data. Others are active attacks.


Q3. Which of the following is/are the recovery goals of the security mechanism?

  • A) Prevent attackers from violating security policy
  • B) Detect attackers’ violation of security policy
  • C) Stop attack, assess and repair damage
  • D) Continue to function correctly even if attack succeeds

Answer :- c, d
✏️ Explanation: Recovery focuses on minimizing damage and maintaining operations, not prevention or detection (which are proactive goals).


Q4. Statement I: Authorization is the identification of legitimate users.

Statement II: Integrity is the protection against data alteration/corruption.**

  • A. Statement I is TRUE and statement II is FALSE
  • B. Statement I is FALSE and statement II is TRUE
  • C. Both statements are TRUE
  • D. Both statements are FALSE

Answer :- b
✏️ Explanation:

  • Statement I is FALSE: Authorization defines what a user can access, not identification.
  • Statement II is TRUE: Integrity ensures data isn’t altered.

Q5. Which of the following is/are hypervisor risks associated with rogue hypervisor rootkits?

  • A) Vulnerable virtual machine applications like Vmchat, VMftp, Vmcat etc.
  • B) Hypervisor that hides itself from normal malware detection systems
  • C) Improper configuration of VM.
  • D) Hypervisor that creates a covert channel to dump unauthorized code.

Answer :- b, d
✏️ Explanation: Rogue hypervisors hide from detection and leak data using covert channels, posing serious risks


Q7. Recovery Time Objective (RTO) represents the period of time allowed for the complete execution of the task.

  • A) TRUE
  • B) FALSE

Answer :- b
✏️ Explanation: RTO is the maximum acceptable downtime for a service after disruption, not the time to complete a task.


Q8. Which of the following Open-source tools is/are used to perform TCP connect probes on the Amazon EC2 platform?

  • A) nmap
  • B) wget
  • C) ipconfig
  • D) hping

Answer :- a
✏️ Explanation: nmap is widely used for TCP probing, port scanning, and network discovery including in cloud environments.


Q9. In para virtualization, VMs interact with the host OS.

  • A) TRUE
  • B) FALSE

Answer :- a
✏️ Explanation: Paravirtualization allows VMs to communicate with the host hypervisor/OS for better performance via modified guest OS.


Q10. In conflict removal, when is introduction of a virtual role required?

  • A) In case of violation of SoD constraint violation.
  • B) In case of cyclic inheritance conflict where exactly matched role set exists.
  • C) In case of cyclic inheritance conflict where no exactly matched role set exists.
  • D) None of the above.

Answer :- c
✏️ Explanation: When no matching role set exists and cyclic inheritance occurs, virtual roles help resolve access conflicts safely.