Find NPTEL Cloud Computing Week 6 answers at nptel.answergpt.in. Our expert-verified solutions simplify complex topics, enhance your understanding of key concepts, and improve your assignment accuracy with confidence.
✅ Subject: Nptel Cloud Computing
📅 Week: 6
🎯 Session: NPTEL 2025
🔗 Course Link: Cloud Computing
🔍 Reliability: Verified and expert-reviewed answers
Use these answers as a reference to cross-check your solutions. For complete, step-by-step solutions across all weeks, explore [Week 1-12] NPTEL Cloud Computing Assignment Answers 2025
🚀 Stay ahead in your NPTEL journey with fresh, updated solutions every week!
| Week-by-Week NPTEL Cloud Computing Assignments in One Place |
|---|
| Cloud Computing Week 1 Answers |
| Cloud Computing Week 2 Answers |
| Cloud Computing Week 3 Answers |
| Cloud Computing Week 4 Answers |
| Cloud Computing Week 5 Answers |
| Cloud Computing Week 6 Answers |
| Cloud Computing Week 7 Answers |
| Cloud Computing Week 8 Answers |
| Cloud Computing Week 9 Answers |
| Cloud Computing Week 10 Answers |
| Cloud Computing Week 11 Answers |
| Cloud Computing Week 12 Answers |
NPTEL Cloud Computing Assignment Week 6 Answers 2025
1. Modification threat on cloud security is an example of:
A. Deception
B. Disclosure
C. Disruption
D. Usurpation
Answer :- For Answers Click Here
2. Which of the following is/are examples) of passive attack?
A. Replay
B. Denial of service
C. Traffic analysis
D. Masquerade
Answer :- For Answers Click Here
3. Interception is an attack on integrity
A. TRUE
B. FALSE
Answer :-
Introduction To Internet Of Things Week 6 NPTEL Assignment Answers
4. Statement I: Intrusion Detection System (IDS) scans the incoming messages, and creates alerts
when suspected scans/attacks are in progress.
Statement II: Authentication is the identification of legitimate users.
A. Statement I is TRUE and statement Il is FALSE.
B. Statement I is FALSE and statement I| is TRUE.
C. Both statements are TRUE.
D. Both statements are FALSE.
Answer :-
5.
Answer :-
6. Recovery Time Objective (RTO) represents the period of time allowed for the complete execution of the task.
A. TRUE
B. FALSE
Answer :- For Answers Click Here
7. The correct statements) for necessary and sufficient conditions for the detection of inheritance
conflict is/are:
A. Sufficient condition: current entry role and at least one exit role forms conflicting pair
B. Sufficient condition: current entry role is senior to at least one exit role
C. Necessary condition: current entry role is senior to at least one exit role
D. Necessary condition: at least one exit role
Answer :-
8. Which of the following is/are hypervisor risks associated with VM escape?
A. Vulnerable virtual machine applications like Vmchat, VMftp, Vmcat etc.
B. Rogue hypervisor that hides itself from normal malware detection systems
C. Improper configuration of VM
D. Rogue hypervisor that creates a covert channel to dump unauthorized code
Answer :-
9. In fault tolerance, replication is the duplication of critical components of a system with the intention of increasing reliability of the system, usually in the case of a backup or fail-safe.
A. TRUE
B. FALSE
Answer :-
10. Which of the following Open-source tools is/are used for retrieving web pages in Amazon EC2
platform?
A. wget
B. hping
C. ifconfig
D. nmap
Answer :- For Answers Click Here
Cloud Computing Week 6 NPTEL Assignment Answers 2024
1. Interception is considered as an attack on
a) Confidentiality
b) Availability
c) Integrity
d) Authenticity
Answer :- a
2. Find the correct statement(s):
a) Different types of cloud computing service models provide different levels of security services
b) Adapting your on-premises systems to a cloud model requires that you determine what security mechanisms are required and mapping those to controls that exist in your chosen cloud service provider
c) Data should be transferred and stored in an encrypted format for security purpose
d) All are incorrect statements
Answer :- a, b, c
3. Which of the following is/are example(s) of passive attack?
a) Replay
b) Denial of service
c) Traffic analysis
d) Masquerade
Answer :- c
4. Modification is considered as an attack on
(a) Confidentiality
(b) Availability
(c) Integrity
(d) Authenticity
Answer :- c
5. Spoofing is not an example of
(a) Deception
(b) Disclosure
(c) Usurpation
(d) Disruption
Answer :- b, d
6. Consider the following statements:
Statement I: Authorization is the identification of legitimate users.
Statement II: Integrity is the protection against data alteration/corruption.
Identify the correct options:
a) Statement I is TRUE and statement II is FALSE.
b) Statement I is FALSE and statement II is TRUE.
c) Both statements are TRUE.
d) Both statements are FALSE.
Answer :- b
7. Access policy control refers to
a) Cyclic Inheritance Control
b) Virus Attack
c) Violation of SoD (separation of duties) Constraint
d) Man in the middle attack
Answer :- a, c
8. Which of the options is/are considered as the basic components of security?
a) Confidentiality
b) Integrity
c) Reliability
d) Efficiency
Answer :- a, b
9. Which of the following is/are not a type of passive attack?
a) Traffic Analysis
b) Release of message contents
c) Denial of service
d) Replay
Answer :- c, d
10. Side channel exploitation has the potential to extract RSA & AES secret keys
a) True
b) False
Answer :- a
Conclusion:
In this article, we have uploaded the Cloud Computing Week 6 NPTEL Assignment Answers. These expert-verified solutions are designed to help you understand key concepts, simplify complex topics, and enhance your assignment performance. Stay tuned for weekly updates and visit www.answergpt.in for the most accurate and detailed solutions.


