Professional Documents
Culture Documents
Unit 8 - Week 6: Assignment 6
Unit 8 - Week 6: Assignment 6
reviewer4@nptel.iitm.ac.in ▼
Unit 8 - Week 6
Register for
Certification exam Assignment 6
The due date for submitting this assignment has passed.
Course As per our records you have not submitted this Due on 2019-04-10, 23:59 IST.
outline
assignment.
Week 1 c) Integrity
d) Authenticity
Week 2
No, the answer is incorrect.
Week 3 Score: 0
Accepted Answers:
Week 4
a) Confidentiality
Week 6 a) Different types of cloud computing service models provide different levels of security
services
Lecture 26:
Cloud b) Adapting your on-premises systems to a cloud model requires that you determine what
Computing: security mechanisms are required and mapping those to controls that exist in your chosen cloud
Security I
service provider
Lecture 27:
c) Data should be transferred and stored in an encrypted format for security purpose
Cloud
Computing: d) All are incorrect statements
Security II
No, the answer is incorrect.
Lecture 28:
Score: 0
Cloud
Computing: Accepted Answers:
Security III a) Different types of cloud computing service models provide different levels of security services
Lecture 29: b) Adapting your on-premises systems to a cloud model requires that you determine what security
Cloud mechanisms are required and mapping those to controls that exist in your chosen cloud service provider
Computing: c) Data should be transferred and stored in an encrypted format for security purpose
Security Issues
in Collaborative 3) Any distributed application has a much greater attack surface than an application that is 1 point
SaaS Cloud closely held on a Local Area Network
© 2014 NPTEL - Privacy & Terms - Honor Code - FAQs -
Lecture 30:
A project of
Cloud a) True In association with
Computing: b) False
Broker for
Cloud No, the answer is incorrect.
Marketplace Funded by
Score: 0
Solution
(a) Deception
(b) Disclosure
(c) Usurpation
(d) Disruption
6) In para-virtualization, VMs run on hypervisor that interacts with the hardware. 1 point
a) True
b) False
b) Virus Attack
a) Confidentiality
b) Integrity
c) Reliability
d) Efficiency
a) Traffic Analysis
c) Denial of service
d) Replay
10)Side channels exploitation has the potential to extract RSA & AES secret keys 1 point
a) True
b) False