Assignment-6 I Introduction to Cloud Computing NPTEL – Discussion
1. Modification is an attack on: Integrity
2. A)Replay: Active attack
B) Denial of service: Active attack
C) Traffic analysis: Passive attack
D) Masquerade: Active attack
3: Which of the following is/are the recovery goal(s) of the security mechanism?
C) Stop attack, assess and repair damage
D) Continue to function correctly even if attack succeeds
4: Statement I: Authorization is the identification of legitimate users.-False
Statement II: Integrity is the protection against data alteration/corruption.-True
5: Which of the following is/are hypervisor risks associated with rogue hypervisor rootkits?
B) Hypervisor that hides itself from normal malware detection systems
D) Hypervisor that creates a covert channel to dump unauthorized code.
6: Injection attack: (c) Introduce malicious code to change the course of execution.
Flooding: (a) Attacker sending huge amounts of requests to a certain service and causing denial of service.
Metadata (WSDL) spoofing attack: (d) Malicious reengineering of Web Services’ metadata description.
7: Recovery Time Objective (RTO) represents the period of time allowed for the complete execution of the task.-False
8:Which of the following Open-source tools is/are used to perform TCP connect probes on the Amazon EC2 platform?-nmap
9:In para virtualization, VMs interact with the host OS.-TRUE
10: In conflict removal, when is introduction of a virtual role required?
C) In case of cyclic inheritance conflict where no exactly matched role set exists.
[ad_2]
source