Cloud Computing Week 6 NPTEL Assignment Answers 2025

Cloud Computing Week 6 NPTEL Assignment Answers

Find NPTEL Cloud Computing Week 6 answers at nptel.answergpt.in. Our expert-verified solutions simplify complex topics, enhance your understanding of key concepts, and improve your assignment accuracy with confidence.

Subject: Nptel Cloud Computing
📅 Week: 6
🎯 Session: NPTEL 2025
🔗 Course Link: Cloud Computing
🔍 Reliability: Verified and expert-reviewed answers

Use these answers as a reference to cross-check your solutions. For complete, step-by-step solutions across all weeks, explore [Week 1-12] NPTEL Cloud Computing Assignment Answers 2025

🚀 Stay ahead in your NPTEL journey with fresh, updated solutions every week!

Week-by-Week NPTEL Cloud Computing Assignments in One Place
Cloud Computing Week 1 Answers
Cloud Computing Week 2 Answers
Cloud Computing Week 3 Answers
Cloud Computing Week 4 Answers
Cloud Computing Week 5 Answers
Cloud Computing Week 6 Answers
Cloud Computing Week 7 Answers
Cloud Computing Week 8 Answers
Cloud Computing Week 9 Answers
Cloud Computing Week 10 Answers
Cloud Computing Week 11 Answers
Cloud Computing Week 12 Answers

NPTEL Cloud Computing Assignment Week 6 Answers 2025

1. Modification threat on cloud security is an example of:

A. Deception
B. Disclosure
C. Disruption
D. Usurpation

Answer :- For Answers Click Here 

2. Which of the following is/are examples) of passive attack?

A. Replay
B. Denial of service
C. Traffic analysis
D. Masquerade

Answer :- For Answers Click Here

3. Interception is an attack on integrity

A. TRUE
B. FALSE

Answer :- 

Introduction To Internet Of Things Week 6 NPTEL Assignment Answers

4. Statement I: Intrusion Detection System (IDS) scans the incoming messages, and creates alerts
when suspected scans/attacks are in progress.
Statement II: Authentication is the identification of legitimate users.

A. Statement I is TRUE and statement Il is FALSE.
B. Statement I is FALSE and statement I| is TRUE.
C. Both statements are TRUE.
D. Both statements are FALSE.

Answer :- 

5.

Answer :- 

6. Recovery Time Objective (RTO) represents the period of time allowed for the complete execution of the task.

A. TRUE
B. FALSE

Answer :- For Answers Click Here 

7. The correct statements) for necessary and sufficient conditions for the detection of inheritance
conflict is/are:

A. Sufficient condition: current entry role and at least one exit role forms conflicting pair
B. Sufficient condition: current entry role is senior to at least one exit role
C. Necessary condition: current entry role is senior to at least one exit role
D. Necessary condition: at least one exit role

Answer :- 

8. Which of the following is/are hypervisor risks associated with VM escape?

A. Vulnerable virtual machine applications like Vmchat, VMftp, Vmcat etc.
B. Rogue hypervisor that hides itself from normal malware detection systems
C. Improper configuration of VM
D. Rogue hypervisor that creates a covert channel to dump unauthorized code

Answer :- 

9. In fault tolerance, replication is the duplication of critical components of a system with the intention of increasing reliability of the system, usually in the case of a backup or fail-safe.

A. TRUE
B. FALSE

Answer :- 

10. Which of the following Open-source tools is/are used for retrieving web pages in Amazon EC2
platform?

A. wget
B. hping
C. ifconfig
D. nmap

Answer :- For Answers Click Here 

Cloud Computing Week 6 NPTEL Assignment Answers 2024

1. Interception is considered as an attack on

a) Confidentiality
b) Availability
c) Integrity
d) Authenticity

Answer :- a

2. Find the correct statement(s):

a) Different types of cloud computing service models provide different levels of security services
b) Adapting your on-premises systems to a cloud model requires that you determine what security mechanisms are required and mapping those to controls that exist in your chosen cloud service provider
c) Data should be transferred and stored in an encrypted format for security purpose
d) All are incorrect statements

Answer :- a, b, c

3. Which of the following is/are example(s) of passive attack?

a) Replay
b) Denial of service
c) Traffic analysis
d) Masquerade

Answer :- c

4. Modification is considered as an attack on

(a) Confidentiality
(b) Availability
(c) Integrity
(d) Authenticity

Answer :- c

5. Spoofing is not an example of

(a) Deception
(b) Disclosure
(c) Usurpation
(d) Disruption

Answer :- b, d

6. Consider the following statements:
Statement I: Authorization is the identification of legitimate users.
Statement II: Integrity is the protection against data alteration/corruption.

Identify the correct options:

a) Statement I is TRUE and statement II is FALSE.
b) Statement I is FALSE and statement II is TRUE.
c) Both statements are TRUE.
d) Both statements are FALSE.

Answer :- b

7. Access policy control refers to

a) Cyclic Inheritance Control
b) Virus Attack
c) Violation of SoD (separation of duties) Constraint
d) Man in the middle attack

Answer :- a, c

8. Which of the options is/are considered as the basic components of security?

a) Confidentiality
b) Integrity
c) Reliability
d) Efficiency

Answer :- a, b

9. Which of the following is/are not a type of passive attack?

a) Traffic Analysis
b) Release of message contents
c) Denial of service
d) Replay

Answer :- c, d

10. Side channel exploitation has the potential to extract RSA & AES secret keys

a) True
b) False

Answer :- a

Conclusion:

In this article, we have uploaded the Cloud Computing Week 6 NPTEL Assignment Answers. These expert-verified solutions are designed to help you understand key concepts, simplify complex topics, and enhance your assignment performance. Stay tuned for weekly updates and visit www.answergpt.in for the most accurate and detailed solutions.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top