NPTEL Cloud Computing Week 6 Assignment 6 Answers

NPTEL Cloud Computing Week 6 Assignment 6 Answer: In this article, you will find NPTEL Cloud Computing Week 6 Assignment 6 Answer , Use “Ctrl+F” To Find Any Questions Answer. & For Mobile User, You Just Need To Click On Three dots In Your Browser & You Will Get A “Find” Option There. Use These Option to Get Any Random Questions Answer. 

Note: We are trying to give our best so please share with your friends also.

NPTEL Cloud Computing Week 6 Assignment 6 Answer


NPTEL Cloud Computing Week 6 Assignment 6 Answer 2022 :-

Q1. Modification threat on cloud security is an example of:

  • Deception
  • Disclosure
  • Disruption
  • Usurpation

Q.2. Which of the following is/are example(s) of passive attack?

  • Replay
  • Denial of service
  • Traffic analysis
  • Masquerade

For Week 7 Assignment Answers Join this Group👇


Q.3. Interception is an attack on integrity

  • True
  • False

Q.4. Statement I: Intrusion Detection System (IDS) scans the incoming messages, and creates alerts when suspected scans/attacks are in progress.

Statement II: Authentication is the identification of legitimate users.

  • Statement I is TRUE and statement II is FALSE.
  • Statement I is FALSE and statement II is TRUE.
  • Both statements are TRUE.
  • Both statements are FALSE.


1. Injection attack                                        (a) Attacker sending huge amounts of requests to a certain service and causing denial of service.

2. Flooding                                                       (b) Browser-based security issues.

3. Metadata (WSDL) spoofing attack     (c) Introduce malicious code to change the course of execution.

                                                                               (d) Malicious reengineering of Web Services’ metadata description.   

  • 1-(a), 2-(b), 3-(d)
  • 1-(c), 2-(a), 3-(d)
  • 1-(b), 2-(c), 3-(d)
  • 1-(a), 2-(c), 3-(d)

NPTEL Cloud Computing All Weeks Assignment Solution: Click Here


Q.6. Recovery Time Objective (RTO) represents the period of time allowed for the complete execution of the task.

  • TRUE

Q.7. The correct statement(s) for necessary and sufficient conditions for the detection of inheritance conflict is/are:

  • Sufficient condition, current entry role and at least one exit role forms conflicting pair.
  • Sufficient condition: current entry role is senior to at least one exit role.
  • Necessary condition current entry role is senior to at least one exit role.
  • Necessary condition at least one exit role.

For Week 7 Assignment Answers Join this Group👇


Q.8. Which of the following is/are hypervisor risks associated with VM escape?

  • Vulnerable virtual machine applications like Vmchat, VMftp, Vmcat etc.
  • Rogue hypervisor that hides itself from normal malware detection systems.
  • Improper configuration of VM.
  • Rogue hypervisor that creates a covert channel to dump unauthorized code.

Q.9. In fault tolerance, replication is the duplication of critical components of a system with the intention of increasing reliability of the system, usually in the case of a backup or fail-safe.

  • TRUE

Q.10. Which of the following Open-source tools is/are used for retrieving web pages in Amazon EC2 platform?

  • wget
  • hping
  • ifconfig
  • nmap


For Any Changes In Answers Join this Group👇


This answer is provided by us only for discussion purpose if any answer will be getting wrong don’t blame us. If any doubt or suggestions regarding any question kindly comment. The solution is provided by Chase2learn. This tutorial is only for Discussion and Learning purpose.


About NPTEL Cloud Computing Course: 

Cloud computing is a scalable services consumption and delivery platform that provides on-demand computing service for shared pool of resources, namely servers, storage, networking, software, database, applications etc., over the Internet. It is a model for enabling ubiquitous, on-demand access to a shared pool of configurable computing resources, which can be rapidly provisioned and released with minimal management effort.

If you have not registered for exam kindly register Through Last date is 12 September 2022.



The course structure and content covers, over a period of 12 weeks, the following 15 modules.

  • Week 1: Introduction to Cloud Computing
  • Week 2: Cloud Computing Architecture
  • Week 3: Service Management in Cloud Computing
  • Week 4: Data Management in Cloud Computing
  • Week 5: Resource Management in Cloud
  • Week 6: Cloud Security
  • Week 7: Open Source and Commercial Clouds, Cloud Simulator
  • Week 8: Research trend in Cloud Computing, Fog Computing
  • Week 9: VM Resource Allocation, Management and Monitoring
  • Week 10: Cloud-Fog-Edge enabled Analytics
  • Week 11: Serverless Computing and FaaS Model
  • Week 12: Case Studies and Recent Advancements

Sharing Is Caring

Leave a Comment