[go: up one dir, main page]

0% found this document useful (0 votes)
266 views4 pages

NPTEL - CC - Assignment 6 2022

This document contains 10 multiple choice questions about cybersecurity topics such as types of cyber attacks, cloud security responsibilities, security properties, honeypots, cloud risks, disaster recovery objectives, port scanning tools, cloud collaboration models, and types of security attacks. Each question is single-select multiple choice format with 4 answer options, and includes the correct answer and a brief explanation. The questions cover a range of fundamental cybersecurity concepts.

Uploaded by

G100 -vishant
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
266 views4 pages

NPTEL - CC - Assignment 6 2022

This document contains 10 multiple choice questions about cybersecurity topics such as types of cyber attacks, cloud security responsibilities, security properties, honeypots, cloud risks, disaster recovery objectives, port scanning tools, cloud collaboration models, and types of security attacks. Each question is single-select multiple choice format with 4 answer options, and includes the correct answer and a brief explanation. The questions cover a range of fundamental cybersecurity concepts.

Uploaded by

G100 -vishant
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

TYPE OF QUESTION: MSQ

Number of questions: 10 Total mark: 10 X 1 = 10

QUESTION 1:
In a cyber-attack, if one entity is pretending to be another one, then it is called.
a) Denial of Service
b) Replay
c) Masquerade
d) Modification

Correct Answer: c
Detailed Solution: Masquerade is “one entity pretends to be a different entity”.

QUESTION 2:
Security responsibilities of a IaaS cloud service provider is typically upto
a) Guest OS
b) Application
c) Solution Stack
d) Hypervisor
Correct Answer: d
Detailed Solution: Security responsibilities of a IaaS cloud Service provider is typically upto
hypervisor.

QUESTION 3:
Which of the following security property ensures that subscriber can’t deny the action done by
him/her.
a) Authorization
b) Non-repudiation
c) Confidentiality
d) Integrity

Correct Answer: b
Detailed Solution: Non repudiation is able to trace what happened and prevent denial of action.
QUESTION 4:
What is honeypot?
a) Manages network traffic filtering rule
b) Scans suspected messages and send alerts
c) Simulates a decoy with services
d) All of the above

Correct Answer: c
Detailed Solution: Honeypot simulates a decoy of host or network with services to understand
the security loophole

QUESTION 5:
Which of the following are the Gartner’s seven cloud computing risks?
a) Regulatory Compliance & Audit
b) Data Location
c) Data Segregation
d) All of the above

Correct Answer: d
Detailed Solution: Refer slide no. 10 of Cloud-Security II.

QUESTION 6:
The ___________ amount of data that will be lost due to an interruption or disaster is defined in
Recovery Point Objective
a) minimum
b) maximum
c) average
d) None of these

Correct Answer: b
Detailed Solution: RTO defines the maximum amount of data that will be lost following an
interruption or disaster.
QUESTION 7:
Which open source tools can be used to probe http and https port?
a) mmap
b) hping
c) wpget
d) All of the above

Correct Answer: b
Detailed Solution: nmap, hping, wget are used to prove port 80 (http) and 443 (https)

QUESTION 8:
Cloud-based collaboration can be
a) Federated
b) Loosely-coupled
c) All of the above
d) None of these

Correct Answer: c
Detailed Solution: Cloud-based collaboration can be tightly-coupled or federated as well as
loosely-coupled.

QUESTION 9:
Which of the following is an attack on integrity of data?
a) Interception
b) Modification
c) Interruption
d) Both a and b

Correct Answer: b
Detailed Solution: Modification is an attack on integrity of data.

QUESTION 10:

Fabrication security attack is an attack on authenticity


a) True
b) False
Correct Answer: a
Detailed Solution: Fabrication security attack is an attack on authenticity.

************END***********

You might also like