0% found this document useful (0 votes)
326 views

Unit 8 - Week 6: Assignment 6

The document provides an overview of security topics related to cloud computing including different types of security attacks, service models, and basic security components. It covers interception attacks, spoofing, modification attacks, access policy controls, confidentiality, integrity, and side channel exploitation among other topics.

Uploaded by

Manju Sk17
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
326 views

Unit 8 - Week 6: Assignment 6

The document provides an overview of security topics related to cloud computing including different types of security attacks, service models, and basic security components. It covers interception attacks, spoofing, modification attacks, access policy controls, confidentiality, integrity, and side channel exploitation among other topics.

Uploaded by

Manju Sk17
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Cloud Computing - - Unit 8 - Week 6 https://onlinecourses-archive.nptel.ac.in/noc19_...

reviewer4@nptel.iitm.ac.in ▼

Courses » Cloud Computing Announcements Course Ask a Question Progress FAQ

Unit 8 - Week 6
Register for
Certification exam Assignment 6
The due date for submitting this assignment has passed.
Course As per our records you have not submitted this Due on 2019-04-10, 23:59 IST.
outline
assignment.

How to access 1) Interception security attack is an attack on 1 point


the portal
a) Confidentiality
Week 0
b) Availability

Week 1 c) Integrity

d) Authenticity
Week 2
No, the answer is incorrect.
Week 3 Score: 0
Accepted Answers:
Week 4
a) Confidentiality

Week 5 2) Point out the correct statement(s): 1 point

Week 6 a) Different types of cloud computing service models provide different levels of security
services
Lecture 26:
Cloud b) Adapting your on-premises systems to a cloud model requires that you determine what
Computing: security mechanisms are required and mapping those to controls that exist in your chosen cloud
Security I
service provider
Lecture 27:
c) Data should be transferred and stored in an encrypted format for security purpose
Cloud
Computing: d) All are incorrect statements
Security II
No, the answer is incorrect.
Lecture 28:
Score: 0
Cloud
Computing: Accepted Answers:
Security III a) Different types of cloud computing service models provide different levels of security services
Lecture 29: b) Adapting your on-premises systems to a cloud model requires that you determine what security
Cloud mechanisms are required and mapping those to controls that exist in your chosen cloud service provider
Computing: c) Data should be transferred and stored in an encrypted format for security purpose
Security Issues
in Collaborative 3) Any distributed application has a much greater attack surface than an application that is 1 point
SaaS Cloud closely held on a Local Area Network
© 2014 NPTEL - Privacy & Terms - Honor Code - FAQs -
Lecture 30:
A project of
Cloud a) True In association with
Computing: b) False
Broker for
Cloud No, the answer is incorrect.
Marketplace Funded by
Score: 0

1 of 3 Thursday 20 June 2019 05:11 PM


Cloud Computing - - Unit 8 - Week 6 https://onlinecourses-archive.nptel.ac.in/noc19_...

Week 6: Accepted Answers:


Powered by
Lecture a) True
Material
4) Modification security attack is an attack on 1 point
Quiz :
Assignment 6
(a) Confidentiality
Feedback for (b) Availability
Week 6
(c) Integrity
Week 7
(d) Authenticity

Week 8 No, the answer is incorrect.


Score: 0
DOWNLOAD
VIDEOS Accepted Answers:
(c) Integrity
Text Transcript 5) Spoofing is not an example of 1 point

Solution
(a) Deception

(b) Disclosure

(c) Usurpation

(d) Disruption

No, the answer is incorrect.


Score: 0
Accepted Answers:
(b) Disclosure
(d) Disruption

6) In para-virtualization, VMs run on hypervisor that interacts with the hardware. 1 point

a) True

b) False

No, the answer is incorrect.


Score: 0
Accepted Answers:
b) False

7) Access policy control refers to 1 point

a) Cyclic Inheritance Control

b) Virus Attack

c) Violation of SoD Constraint

d) Man in the middle attack

No, the answer is incorrect.


Score: 0
Accepted Answers:
a) Cyclic Inheritance Control
c) Violation of SoD Constraint

8) Which of the options is/are the basic components of security? 1 point

a) Confidentiality

b) Integrity

c) Reliability

d) Efficiency

2 of 3 Thursday 20 June 2019 05:11 PM


Cloud Computing - - Unit 8 - Week 6 https://onlinecourses-archive.nptel.ac.in/noc19_...

No, the answer is incorrect.


Score: 0
Accepted Answers:
a) Confidentiality
b) Integrity

9) Which of the following is/are not a type of passive attack? 1 point

a) Traffic Analysis

b) Release of message contents

c) Denial of service

d) Replay

No, the answer is incorrect.


Score: 0
Accepted Answers:
c) Denial of service
d) Replay

10)Side channels exploitation has the potential to extract RSA & AES secret keys 1 point

a) True

b) False

No, the answer is incorrect.


Score: 0
Accepted Answers:
a) True

Previous Page End

3 of 3 Thursday 20 June 2019 05:11 PM

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy