Download as pdf
Download as pdf
You are on page 1of 1
ee ‘About the Course co Unit 8 - Week 6 ‘Course outine vecdosernres en Week 6 Assignment 6 ST ‘Thea date forsubmiting thi ssgnment ha ossad Due on 2020-04-06, 23:59 IST, ‘As per ou ecrds you havent subi hs assignment wook's spoofing is an example of = Week? (2) Deception (©) Disclosure weeks (6) Usurpation a (@ Disruption Week 5 ted ® weeks 8 (© Lecture 26: Goud Computing: ° Seay tormrewriscoret Leche 27:8 Corp deteted Anes: seat s Lecture 28: Goud Computing: ° etn cose 2 Which of the options is/are the basic components of security? ‘pont Scorer (2) Confidentiality Gabon Sa8 Cut ) mtegriy scars 30: Goud Compas (© Reliability (Groker for lous Mareeplace (@) Efficiency Ln mt ak = is Weak Asnnment 8 Wink Fon ° 6 Woot aaa Weeks serpin brows: “a Tanaris * ° [APassive Attack 1. Traffic Analysis hoon eta Suton B: Active Attack 2: Dental of Service Release of message contents Le naracte Sesion Replay @a1e2Bse4 ()Aia4B-382 (JA1a3.8-284 (@a1283,8-4 ® 8 ° 6 to, anmaininorc donted Aner: 8 Statement 1: Access policy control refers to Violation of SoD Constraint and Cyclic Inheritance tm Control Statement 2:Modiication security attack san attack on Confidentiality (a) Statement 1 is True and Statement 2is False (b) Statement 1 lg False and Statement 2is True (6) Both are True (Both are False ® ® © 6 tesrarewrisicoret deste Aner: s 5) ‘The sufficient condition to detect SoD constraint violations: 1 paint a) Atleast one exit role ') Current entry role is sonlorto at least one exit role ‘Current entry role and atleast one exit roles form the conflicting pat a 5 ° to,eanmainiorc dompted Aner: a © Interception security attack is an attack on i (@) Confidentiality (0) Availablity (6) Integrity (@) Authenticity ® 8 ° 6 to, anmaininorc dented Aner: e 7 Inpara-virtualization, VMs run on hypervisor that interacts with the hardware, point a) True ») False ® rer nner donnie Ano: o ® Different types of cloud computing service models provide different levels of security services coal (@) TRUE (b) FALSE ® 8 ta rem coro deste Aner: s 9) abrication securty attack s an attack on 1 paint 3) Confidentiality bp Avatlabilty o) Integrity 4) Authenticty » a done An: a ‘poet “9 Statement 1: Any distesbuted application has a much greater attack surface than an application, that is closely held on a Local Area Network, Statement 2: Reliability and Efficiency are basic components of security (@) Statement 1 is True and Statement 2is False (b) Statement 1 is False and Statement 21s True (©) Bothare True (@) Bothare False » » 8 6 ‘copie Anewors a

You might also like