Cloud Computing Week 6 NPTEL Assignment Answers 2025

Need help with this week’s assignment? Get detailed and trusted solutions for Cloud Computing Week 6 NPTEL Assignment Answers. Our expert-curated answers help you solve your assignments faster while deepening your conceptual clarity.

✅ Subject: Cyber Security and Privacy
📅 Week: 6
🎯 Session: NPTEL 2025 July-October
🔗 Course Link: Click Here
🔍 Reliability: Verified and expert-reviewed answers
📌 Trusted By: 5000+ Students

For complete and in-depth solutions to all weekly assignments, check out 👉 NPTEL Cloud Computing Week 6 NPTEL Assignment Answers

🚀 Stay ahead in your NPTEL journey with fresh, updated solutions every week!

NPTEL Cloud Computing Week 6 Assignment Answers 2025

1. Modification of data in transit is considered as an attack on

A) Confidentiality
B) Integrity
C) Availability
D) Authenticity

Answer : See Answers

2. A phishing attack is mainly an attack on

A) Confidentiality
B) Availability
C) Integrity
D) Authenticity

Answer :

3. Which of the following attacks is NOT passive?

A) Eavesdropping
B) Snooping
C) Masquerading
D) Traffic Analysis

Answer :

4. Denial-of-Service (DoS) is an example of

A) Disruption
B) Disclosure
C) Usurpation
D) Deception

Answer :

5. Which step involves actively testing systems for security weaknesses?

A) Reconnaissance
B) Vulnerability scanning
C) Penetration testing
D) Post-attack investigation

Answer :

6. Reconnaissance in network security is the phase where attackers or testers collect information about the target system.

A) True
B) False

Answer : See Answers

7. Statement I: Authentication is the process of verifying the identity of a user or system
Statement II: Non-repudiation ensures that a sender cannot deny sending a message.
Options:

A) Statement I is TRUE and Statement II is FALSE.
B) Statement I is FALSE and Statement II is TRUE.
C) Both statements are TRUE.
D) Both statements are FALSE.

Answer :

8. A company develops a custom machine learning model. They want full control over the operating system, runtime libraries, and storage but do not want to manage physical servers, power, or networking. Which cloud service model best suits their needs?

a) SaaS
b) laas
c) PaaS
d) DaaS

Answer :

9. A healthcare company must follow HIPAA guidelines when storing patient data in the cloud. This
is an example of which security risk?

A) Regulatory Compliance & Audit
B) Data Location
C) Recovery
D) Investigative Support

Answer :

10. Vendor lock-in is most directly associated with which long-term viability challenge?

a) Difficulty in migrating data to another provider
b) Unauthorized data disclosure
c) Increased regulatory audits
d) Privileged user misuse

Answer : See Answers

NPTEL Cloud Computing Week 6 Assignment Answers 2024

Q1. Modification is an attack on:

  • A) Authenticity
  • B) Integrity
  • C) Confidentiality
  • D) Availability

Answer :- b
✏️ Explanation: Modification attacks alter data, which directly compromises integrity, i.e., the trustworthiness and accuracy of data.


Q2. Which of the following is/are examples of passive attack?

  • A) Replay
  • B) Denial of service
  • C) Traffic analysis
  • D) Masquerade

Answer :- c
✏️ Explanation: Traffic analysis is a passive attack that monitors communications without altering data. Others are active attacks.


Q3. Which of the following is/are the recovery goals of the security mechanism?

  • A) Prevent attackers from violating security policy
  • B) Detect attackers’ violation of security policy
  • C) Stop attack, assess and repair damage
  • D) Continue to function correctly even if attack succeeds

Answer :- c, d
✏️ Explanation: Recovery focuses on minimizing damage and maintaining operations, not prevention or detection (which are proactive goals).


Q4. Statement I: Authorization is the identification of legitimate users.

Statement II: Integrity is the protection against data alteration/corruption.**

  • A. Statement I is TRUE and statement II is FALSE
  • B. Statement I is FALSE and statement II is TRUE
  • C. Both statements are TRUE
  • D. Both statements are FALSE

Answer :- b
✏️ Explanation:

  • Statement I is FALSE: Authorization defines what a user can access, not identification.
  • Statement II is TRUE: Integrity ensures data isn’t altered.

Q5. Which of the following is/are hypervisor risks associated with rogue hypervisor rootkits?

  • A) Vulnerable virtual machine applications like Vmchat, VMftp, Vmcat etc.
  • B) Hypervisor that hides itself from normal malware detection systems
  • C) Improper configuration of VM.
  • D) Hypervisor that creates a covert channel to dump unauthorized code.

Answer :- b, d
✏️ Explanation: Rogue hypervisors hide from detection and leak data using covert channels, posing serious risks


Q7. Recovery Time Objective (RTO) represents the period of time allowed for the complete execution of the task.

  • A) TRUE
  • B) FALSE

Answer :- b
✏️ Explanation: RTO is the maximum acceptable downtime for a service after disruption, not the time to complete a task.


Q8. Which of the following Open-source tools is/are used to perform TCP connect probes on the Amazon EC2 platform?

  • A) nmap
  • B) wget
  • C) ipconfig
  • D) hping

Answer :- a
✏️ Explanation: nmap is widely used for TCP probing, port scanning, and network discovery including in cloud environments.


Q9. In para virtualization, VMs interact with the host OS.

  • A) TRUE
  • B) FALSE

Answer :- a
✏️ Explanation: Paravirtualization allows VMs to communicate with the host hypervisor/OS for better performance via modified guest OS.


Q10. In conflict removal, when is introduction of a virtual role required?

  • A) In case of violation of SoD constraint violation.
  • B) In case of cyclic inheritance conflict where exactly matched role set exists.
  • C) In case of cyclic inheritance conflict where no exactly matched role set exists.
  • D) None of the above.

Answer :- c
✏️ Explanation: When no matching role set exists and cyclic inheritance occurs, virtual roles help resolve access conflicts safely.