You are on page 1of 25

​ NPTEL Online Certification Courses

​ Indian Institute of Technology Kharagpur

Cloud Computing
Assignment-Week 5
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10

QUESTION 1:
Which of the following is/are the objective(s) of Resource Management?
A) Increased overhead
B) Increased throughput
C) Increased latency
D) Scalability
Correct Answer: B, D
Detailed Solution: From definition of resource management. Reduced overhead and reduced latency are
objectives. Others are correct.

QUESTION 2:
Multiple KPIs are aggregated to SLA.
A) True
B) False

Correct Answer: B
Detailed Solution: KPIs are aggregated to SLO.

QUESTION 3:
In computing, Performance/Watt follows Moore’s law
A) True
B) False
Correct Answer: B
Detailed Solution: In computing, Performance/Watt does not follow Moore’s law. Refer slide 7 of Resource
Management-I.

QUESTION 4:
Which of the following is/are resource adaptation approaches?

A) Reinforcement learning guided control policy


B) Intelligent multi-agent model
C) Network queueing model
​ NPTEL Online Certification Courses

​ Indian Institute of Technology Kharagpur

D) Web-service based prototype

Correct Answer: A, D

Detailed Solution: Reinforcement learning guided control policy and web-service based prototype are
resource adaptation approaches. The Intelligent multi-agent model is a resource allocation approach.
Network queueing model is a resource provisioning approach.

QUESTION 5:
A third party application runs in the cloud for 18 hours/day. At the end of one month (30 days), it was found
that the cloud suffered outages totaling 6 hours and T hours, on different days over the service period. The
cloud guarantees service availability for 98% of the time. What are the value(s) of T among the given
options such that the SLA negotiation does NOT get honored in terms of service availability?
A) 3 hours
B) 5 hours
C) 6 hours
D) 4 hours

Correct Answer: B, C
Detailed Solution: Total Outage: (6+T) hours, application runs for 540 hours in a month. Availability = 1 -
(downtime/uptime). For availability: [1- {(6+T)/(534-T)}] >= 0.98, T<=4.59 hours.
Options B and C are correct as the SLA negotiation does not get honored.

QUESTION 6:
Consider that the peak computing demand for an organization is 200 units. The demand as a function of time
can be expressed as D(t) = 8t. Baseline (owned) unit cost is 120 and cloud unit cost is 150. The cloud is
owned for a period of T time units. Select the values of T for which cloud is cheaper than owning.
A) 25
B) 30
C) 35
D) 45

Correct Answer: A, B, C
Detailed Solution: Total baseline cost BT = P ⨯ B ⨯ T = 200*120*T = 24,000*T units.
𝑇 𝑇 𝑇
2
𝑡
Total cloud cost CT = ∫ 𝐶 * 𝐷(𝑡)𝑑𝑡 = ∫ 150 * 8𝑡 𝑑𝑡 = 1200* [ 2
] = 600*(T2) units
0 0 0
2
Utility function UT = (CT/BT) = 600*T /24,000*T = T/40.
​ NPTEL Online Certification Courses

​ Indian Institute of Technology Kharagpur

For T < 40 units, cloud is cheaper than owning. For the other cases, cloud is costlier than owning.

QUESTION 7:
Which of the following is/are true regarding penalty cost? (Here D(t) and R(t) are instantaneous demand and
resources at time t.)

A) If demand is flat, the penalty is equal to 0.

B) Penalty cost ∝ ∫|𝐷(𝑡)/𝑅(𝑡)|𝑑𝑡

C) If demand is exponential (D(t)=et), any fixed provisioning interval (tp) according to the current
demands will fall linearly behind.
D) The penalty cost for exponential demand is exponential.

Correct Answer: A, D

Detailed Solution: Penalty cost ∝ ∫|𝐷(𝑡) − 𝑅(𝑡)|𝑑𝑡. If demand is exponential (D(t)=et), any fixed

provisioning interval (tp) according to the current demands will fall exponentially, NOT linearly behind.

QUESTION 8:
In resource management, _____________ is determining when an activity should start or end, depending on
its duration, predecessor activities, predecessor relationships etc.

A) Resource allocation
B) Resource mapping
C) Resource scheduling
D) Resource modeling

Correct Answer: C

Detailed Solution: Resource scheduling is determining when an activity should start or end, depending on
its duration, predecessor activities, predecessor relationships and resources allocated, from slide-10 of
resource management-II. So, the correct option is C.
.

QUESTION 9:
Which of the following techniques can be used to conserve energy within a Cloud environment?

A) Schedule VMs to conserve energy.


B) Optimize data center design.
C) Maximize operating inefficiencies for non-essential tasks.
D) Management of both VMs and underlying infrastructure.

Correct Answer: A, B, D
​ NPTEL Online Certification Courses

​ Indian Institute of Technology Kharagpur

Detailed Solution: Refer to slide-8 of Resource Management-I. The operating inefficiencies for
non-essential tasks should be minimized.

QUESTION 10:

An app collects the ratings of restaurants in a particular location and logs it in the following form: <userId,
restaurantId, rating>. ‘restaurantId’ takes any of the values (A, B, C, D) and each user having a unique userId
can provide [0,5] rating. There are three files and each file consists of three columns: userId, restaurantId and
rating. Each file may consist of the data for the same user or same restaurant multiple times. Now, out of this
data, we need to calculate the number of times each restaurant gets a “5 star” rating from users.

The MapReduce framework will divide it into three map tasks and each map task will perform data functions
on one of the three files. The inputs are as shown below.

M1: {(u1,A,5); (u1,B,3); (u2,A,5); (u3,C,5); (u3,D,2); (u7,D,5) }

M2: {(u1,C,3); (u1,D,5); (u2,C,5); (u2,D,5); (u4,D,5); (u6,A,5) }

M3: {(u1,A,5); (u2,A,5); (u2, B,5); (u3,B,5); (u4,C,5); (u3,D,5) }

The tasks of all mappers (M1, M2 and M3) are passed to the reducer job. Reducer will output:

(a) <A, 5>; <B, 5>; <C, 5>; <D, 5>


(b) <A, 5>; <B, 2>; <C, 3>; <D, 5>
(c) A; B; C; D
(d) <A, 5>; <D,5>

Correct Answer: B
Detailed solution: The reducer function aggregates the number of times each restaurant gets the highest
rating (5) from all the mappers’ output. It is observed that option B is correct after counting the number of
highest ratings each restaurant received.
​ NPTEL Online Certification Courses

​ Indian Institute of Technology Kharagpur

Cloud Computing
Assignment-Week 7
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10

QUESTION 1:
_________ ensures the ability to exchange / obtain the information to be
“consumed”.
a) Data Level Interoperability
b) Security Level Interoperability
c) Service Level Interoperability
d) None of the above

Correct Answer: c
Detailed Solution: Service Level Interoperability ensures the ability to exchange
/ obtain the information to be “consumed”. So, the correct option is (c). Lecture
35, 32:00

QUESTION 2:

Fog computing enablers are

a. Virtualization
b. Big data
c. Service oriented architecture
d. None of these

Correct Answer: a, c

Detailed Solution: Fog computing enablers are Virtualization, Service oriented architecture.

Correct options are (a), (c). Lecture 33, 23:00

QUESTION 3:
Consider the following statements:
Statement 1: In Geospatial Cloud, it is needed to integrate data from heterogeneous back-end data
services.
​ NPTEL Online Certification Courses

​ Indian Institute of Technology Kharagpur

Statement 2: Data services can be inside and/or outside of the cloud environment in Geospatial
Cloud.

a. Statement 1 is Correct, but Statement 2 is Incorrect.


b. Statement 2 is Correct, but Statement 1 is Incorrect.
c. Both statements are Correct.
d. Both statements are Incorrect
Correct Answer: c

Detailed Solution: Both statements are correct regarding Geospatial Cloud concept. So, the correct
option is (c). Refer to Lecture 35.

QUESTION 4:
Which of the following statements is false about Code offloading using cloudlet?
Statement 1: The architecture reduces latency by using multi-hop network.
Statement 2: It potentially lowers battery consumption by using short range radio.
a. Statement 1 is correct but Statement 2 is incorrect
b. Statement 2 is correct but Statement 1 is incorrect
c. Both the statements are correct
d. Both the statements are incorrect.

Correct Answer: b

Detailed Solution: The architecture reduces latency by using a single-hop network and potentially
lowers battery consumption by using Wi-Fi or short range radio. So, the correct option is (b).
Lecture 32, 20:40.
QUESTION 5:

Which of the following is/are a feature(s) of Mobile Cloud Computing?

a) Uses lesser mobile device resources because applications are cloud-supported


b) Reduces reliability with information backed up and stored in the cloud
c) Mobile devices connect to services delivered through an API architecture
d) Facilitates slower development, delivery and management of mobile apps
​ NPTEL Online Certification Courses

​ Indian Institute of Technology Kharagpur

Correct Answer: a, c
Detailed Solution: Mobile cloud computing features are: Facilitates the quick development,
delivery and management of mobile apps. Uses fewer device resources because applications are
cloud-supported. Mobile devices connect to services delivered through an API architecture.
Improves reliability with information backed up and stored in the cloud. So, the correct options are
(a) and (c). Lecture 31, 13:14.

QUESTION 6:
Which of the following statement(s) is/are FALSE about Fog Computing?

a) Fog nodes present near to the end-user


b) Fog computing enables real-time applications
c) Fog nodes’ response time is much higher than Cloud’s
d) Network routers, WiFi Gateways will not be capable of running applications

Correct Answer: c, d
Detailed Solution: Fog nodes present near to the end-user, Fog computing use for real-time
applications, Fog nodes’ response time is much lower than cloud server, network routers, WiFi
Gateways will be capable of running applications. So, the correct options are (c), (d).

QUESTION 7:
Which of the following options is correct about geographic information?
Statement 1: Geographic information could be static or dynamic.
Statement 2: Geographic information varies in scale.
Statement 3: Population of a city/town is a static geographic information
a. Statement 1 & 2 are True, but Statement 3 is False.
b. Statement 2 & 3 are True, but Statement 1 is False.
c. Statement 1& 3 are True, but Statement 2 is False.
d. All the statements are True.

Correct Answer: a

Detailed Solution: Population of a city is a dynamic geographic information. Lecture 35, 5:54.
​ NPTEL Online Certification Courses

​ Indian Institute of Technology Kharagpur

QUESTION 8:
Benefits of Fog Computing is/are:

a. Immobility
b. Low latency and location-aware.
c. Homogeneity
d. Widespread geographical distribution.

Correct Answer: b, d
Detailed Solution: Benefits of Fog Computing are (i) Very large number of nodes are involved, (ii)
Low latency and location-aware, (iii) Heterogeneity and (iv) Widespread geographical distribution.
So, the correct options are (b) and (d).

QUESTION 9:

Distance between the client and server in Cloud Computing is of _________ and Fog computing is
_______.

a) One Hop, Multiple Hop


b) One Hop, One Hop
c) Multiple Hop, One Hop
d) Multiple Hop , Multiple Hop

Correct Answer: c
Detailed Solution: Distance between the client and server in Cloud Computing is of multiple hop
and Fog computing is one hop. Refer Lecture 34.

QUESTION 10:
Match the following tables related to Mobile Cloud Computing key components:
Table – I Table – II

Table – I Table – II

1. Profiler i. Collects results of split execution and


2. Solver combine, and make the execution
3. Synchronizer details transparent to the user

ii. Monitors application execution to collect


​ NPTEL Online Certification Courses

​ Indian Institute of Technology Kharagpur

data about execution time, power


consumption, network traffic
iii. The task of selecting which parts of an app
runs on mobile and cloud

a. 1. -> (ii), 2. -> (iii), 3. -> (i)


b. 1. -> (iii), 2. -> (i), 3. -> (ii)
c. 1. -> (i), 2. -> (ii), 3. -> (iii)
d. 1. -> (ii), 2. -> (i), 3. -> (iii)
Correct Answer: a

Detailed Solution:
Profiler monitors application execution to collect data about the time to execute, power
consumption, network traffic. Solver has the task of selecting which parts of an app runs on
mobile and cloud. Task of synchronizer modules is to collect results of split execution and
combine, and make the execution details transparent to the user. So, the correct option is (a).
​ NPTEL Online Certification Courses

​ Indian Institute of Technology Kharagpur

Cloud Computing
Assignment-Week 8
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10

QUESTION 1:
Statement 1: Sensor-Cloud proxy exposes sensor resources as cloud services.
Statement 2: Sensor network is still managed from the Sensor-Cloud Interface via Sensor
Network Proxy
a. Statement 1 is True and Statement 2 is False
b. Statement 2 is True and Statement 1 is False
c. Both statements are True
d. Both statements are False
Correct Answer: c
Detailed Solution: Sensor cloud proxy exposes sensor resources as cloud services.
Sensor network is still managed from the Sensor-Cloud
Interface via Sensor Network Proxy. Lecture 38, 21:43 min.- 22:09 min

QUESTION 2:
A green broker can perform scheduling of applications to reduce energy consumption.
a. True
b. False

Correct Answer: a
Detailed Solution: A green broker can perform scheduling of applications to reduce energy
consumption. So, the correct option is (a).

QUESTION 3:
In IoT based vehicular data clouds, vehicles providing their networking and data processing
capabilities to other vehicles through the cloud is best identified with which of the following
services?
a. SaaS
b. PaaS
c. IaaS
​ NPTEL Online Certification Courses

​ Indian Institute of Technology Kharagpur

d. BaaS

Correct Answer: c
Detailed Solution: This comes under a new service named Network and Data processing as a
service i.e. IaaS. So, the correct option is (c).

QUESTION 4:
Which of the following statements is/are true about Docker ?
Statement 1: Docker hub is used for building docker images and creating docker containers.
Statement 2: Docker compose is a registry used to host various docker images.

a. Statement 1 is correct but Statement 2 is incorrect


b. Statement 2 is correct but Statement 1 is incorrect
c. Both the statements are correct
d. Both the statements are incorrect.

Correct Answer: d

Detailed Solution: Docker Engine is used for building docker images and creating docker
containers. Docker Hub is a registry used to host various docker images.
So, the correct option is (d). Lecture 36,17:34.

QUESTION 5:
Choose the most appropriate option.
Statement 1: An image is a lightweight, stand-alone, executable package that includes everything
to run a piece of software.
Statement 2:Container is a run time instance of an image.

a. Statement 1 is correct but Statement 2 is incorrect


b. Statement 2 is correct but Statement 1 is incorrect
c. Both the statements are correct
d. Both the statements are incorrect.
​ NPTEL Online Certification Courses

​ Indian Institute of Technology Kharagpur

Correct Answer: c
Detailed Solution: Both the statements are correct. Lecture 36, 20:51 min

QUESTION 6:
Sensor data can be easily shared by different groups of users without any extra effort/ measure.
a. True
b. False
Correct Answer: b
Detailed Solution: One of the limitations of Sensor Networks is “Sensor data can not be easily
shared by different groups of users.” Hence, the correct option is (b). Lecture 38, 9:32 min.

QUESTION 7:
An IoT platform’s basic building blocks is/ are (choose the correct option(s)).
a. Gateway
b. Images
c. Network and Cloud
d. Containers
Correct Answer: a, c
Detailed Solution: An IoT platform has three basic building blocks, Things, Gateway, and Network
and Cloud. Lecture 39, 10:09 min.

QUESTION 8:

__________ enables different networks, spreads in a huge geographical area to connect together
and be employed simultaneously by multiple users on demand.
a) Serverless
b) IoT Cloud
c) Sensor Cloud
d) Green Cloud
Correct Answer: c
Detailed Solution: Sensor Cloud enables different networks, spreads in a huge geographical area to
connect together and be employed simultaneously by multiple users on demand. Lecture 38, 20:27
​ NPTEL Online Certification Courses

​ Indian Institute of Technology Kharagpur

QUESTION 9:
In the context of Green Cloud Computing, the Power Usage Effectiveness is defined as
a. Power Delivered / Overall Power
b. Overall Power / Power Delivered
c. Overall Power * Power Delivered
d. None of these

Correct Answer: b
Detailed Solution: In the context of Green Cloud Computing, the Power Usage Effectiveness is
defined as Overall Power / Power Delivered. So, the correct option is (b). Lecture 37, 28:45 min.

QUESTION 10:
___________ get virtual access to host resources through a hypervisor.
a) Containers
b) Virtual machines
c) Both a and b
d) Images

Correct Answer: b
Detailed Solution: Virtual machines get virtual access to host resources through
a hypervisor. So, the correct option is (b). Lecture 36, 24:10
​ NPTEL Online Certification Courses

​ Indian Institute of Technology Kharagpur

Cloud Computing
Assignment-Week 9
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10

QUESTION 1:
Statement I: Fog computing supports real-time interactions which is not the case in cloud computing.
Statement II: Fog computing reduces latency compared to cloud computing.
Select the correct option.
A) Statement I is TRUE and Statement II is FALSE.
B) Statement II is TRUE and Statement I is FALSE.
C) Both statements are TRUE.
D) Both statements are FALSE.

Correct Answer: B
Detailed Solution: Statement II is correct. In Statement I, both fog and cloud computing support real-time
interactions. So Statement I is false. Hence, the correct answer is B.

QUESTION 2:
In the Cloud-Fog-Edge Computing paradigm, Cellular base stations, Network routers and WiFi Gateways
can run applications.
A) True
B) False

Correct Answer: A
Detailed Solution: In the Cloud-Fog-Edge Computing paradigm, Cellular base stations, Network routers
and WiFi Gateways are capable of running applications. Hence, the statement is correct.

QUESTION 3:
Which of the following statement(s) are true regarding the cloud-fog environment model?
A) The cloud–fog environment model consists of three layers: a client layer (edge), a fog layer, and a
cloud layer.
B) Virtual machines (VMs) operate for the cloud data server, process them, and then deliver the results
to the cloud server manager.
C) If there is no/limited availability of resources in the fog layer, then the request is passed to the cloud
layer.
​ NPTEL Online Certification Courses

​ Indian Institute of Technology Kharagpur

D) Fog servers contain fog server manager and virtual machines to manage requests by using container
virtualization technique.

Correct Answer: A, C
Detailed Solution: Regarding the cloud-fog environment model, Virtual machines (VMs) operate for the fog
data server, process them, and then deliver the results to the fog server manager. The fog servers contain fog
server manager and virtual machines to manage requests by using server virtualization technique. The other
statements are correct. Hence, the answers are A and C.

QUESTION 4:
Which of the following algorithms used in resource management in cloud-fog-edge computing is used to
capture the performance (of entities like, CPU, storage, network, etc.) of a computing system?

A) Discovery
B) Load Balancing
C) Placement
D) Benchmarking

Correct Answer: D

Detailed Solution: Benchmarking algorithm used in resource management in cloud-fog-edge computing is


used to capture the performance (of entities like, CPU, storage, network, etc.) of a computing system.

QUESTION 5:
According to the service placement taxonomy in fog-edge computing, which of the following can be
classified as online vs offline?
A) Control plan design
B) Placement characteristic
C) System dynamicity
D) Mobility support

Correct Answer: B
Detailed Solution: According to the service placement taxonomy in fog-edge computing, placement
characteristic can be classified as online vs offline.

QUESTION 6:
Select the correct statement(s) regarding offloading.

A) Offloading is a technique in which a server, an application, and the associated data are moved from the
edge to the cloud.

B) Offloading augments the computing requirements of individuals or a collection of user devices.


​ NPTEL Online Certification Courses

​ Indian Institute of Technology Kharagpur

C) Offloading from cloud to the edge can be achieved by server offloading.

D) Offloading from user device to edge can be achieved by application partitioning.

Correct Answer: B, C, D

Detailed Solution: Offloading is a technique in which a server, an application, and the associated data are
moved onto the edge of the network. Hence, A is false. All the other statements are correct. Refer to slide-12
of Resource Management - II.

QUESTION 7:
Different Cloud Service Providers join together to form a federation.
A) True
B) False
Correct Answer: A
Detailed Solution: Refer to slide 7 of Cloud Federation.

QUESTION 8:
Which of the following are NOT benefits of cloud federation?

A) Minimize resource utilization


B) Load balancing
C) Maximize power consumption
D) Global utility

Correct Answer: A, C

Detailed Solution: The benefits of cloud federation are: Maximize resource utilization; Minimize
power consumption; Load balancing; Global utility; Expand CSP’s global footprints. A and C are not
benefits, hence are the correct options.

QUESTION 9:
In which of the following cloud federation architectures, creation of cross‐site networks and cross‐site
migration of VMs are used?

A) Loosely coupled federation


B) Partially coupled federation
C) Tightly coupled federation
D) None of the above

Correct Answer: C
​ NPTEL Online Certification Courses

​ Indian Institute of Technology Kharagpur

Detailed Solution: Advanced features like creation of cross‐site networks and cross‐site migration of VMs
are found in tightly coupled federation.

QUESTION 10:
In which of the following architectures, two or more partner clouds interoperate to aggregate their resources
and provide users with a larger virtual infrastructure?

A) Hybrid/Bursting Architecture
B) Aggregated Architecture
C) Broker Architecture
D) Multiplier Architecture

Correct Answer: B
Detailed Solution: In aggregated cloud federation architecture, two or more partner clouds interoperate to
aggregate their resources and provide users with a larger virtual infrastructure.
​ NPTEL Online Certification Courses

​ Indian Institute of Technology Kharagpur

Cloud Computing
Assignment-Week 12
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10

QUESTION 1:
In which computing environment is latency fixed due to the location of application modules at the
Area Gateway?
A) Fog computing
B) Cloud computing
C) Serverless Computing
D) None of the above

Correct Answer: A
Detailed Solution: In fog computing environment is latency fixed due to the location of application
modules at the Area Gateway

QUESTION 2:
What does spatial cloud support in terms of resource pooling?
A) Individual resource allocation for participating organizations
B) Exclusive resource ownership for each organization
C) Shared resource pooling for participating organizations
D) Restricted access to network, servers, apps, services, storages, and databases

Correct Answer: C
Detailed Solution: Spatial cloud supports shared resource pooling which is useful for participating
organizations with common or shared goals

QUESTION 3:
Dew computing is an on premises computer software-hardware organization paradigm where
on‐premises computers provide functionality that is ___________ of cloud services and is also
________ with cloud services.
​ NPTEL Online Certification Courses

​ Indian Institute of Technology Kharagpur

A) independent, serverless
B) dependant, collaborative
C) independent, collaborative
D) serverless, collaborative

Correct Answer: C
Detailed Solution: Dew computing is an on premises computer software-hardware organization
paradigm where on‐premises computers provide functionality that is independent of cloud services
and is also collaborative with cloud services.

QUESTION 4:
Fog-Edge computing leads to increased network congestion
A) True
B) False
Correct Answer: B
Detailed Solution: Fog-Edge computing leads to less network congestion

QUESTION 5:
A Cyber‐Physical Cloud Computing (CPCC) architectural framework is a ________environment
that can rapidly build, modify and provision cyber‐physical systems composed of a set
of__________ based sensor, processing, control, and data services.

A) system, cloud computing


B) cloud computing, system
C) system, edge computing
D) edge, system computing

Correct Answer: A
Detailed Solution: A Cyber‐Physical Cloud Computing (CPCC) architectural framework can be
defined as “a system environment that can rapidly build, modify and provision cyber‐physical
systems composed of a set of cloud computing based sensor, processing, control, and data
services.”

QUESTION 6:
What is(are) the key feature(s) of Mobile Cloud computing for 5G networks?
A) Increased resource consumption by mobile applications
B) Improved reliability due to data storage in the cloud
C) Sharing resources for mobile applications
D) None of these

Correct Answer: B and C


​ NPTEL Online Certification Courses

​ Indian Institute of Technology Kharagpur

Detailed Solution: Key features of MCC for 5G networks include sharing resources for mobile
applications and improved reliability as data is backed up and stored in the cloud.

QUESTION 7:
The key aspect of the intelligent transportation system is efficient _____________.
A) cost
B) mobility
C) speed
D) delivery

Correct Answer: B
Detailed Solution: The key aspect of the intelligent transportation system is efficient mobility.

QUESTION 8:
In conjunction with 5G and cloud computing, what should service providers focus on in the
evolving computing paradigm?

A) Limiting end-to-end orchestration


B) Providing manual service layer agreements
C) Offering limited self-service options
D) Providing full end-to-end orchestration with defined service layer agreements

Correct Answer: D
Detailed Solution: In evolving cloud computing paradigm with 5G, service providers should look
to provide full end‐to‐end orchestration, with a defined service layer agreements, in a self‐service
and automated way.

QUESTION 9:
Mobility Analytics utilizes the cloud platform for computation and storage.
A) True
B) False
Correct Answer: A
Detailed Solution: Mobility Analytics utilizes a Cloud platform for computation and storage.
​ NPTEL Online Certification Courses

​ Indian Institute of Technology Kharagpur

QUESTION 10:
What is(are) the benefit(s) of 5G technology for enhanced mobile broadband?
A) Slower data rates
B) Higher latency
C) Lower cost-per-bit
D) Limited device compatibility

Correct Answer: C
Detailed Solution: In addition to making our smartphones better, 5G mobile technology can
usher in new immersive experiences such as VR and AR with faster, more
uniform data rates, lower latency, and lower cost per bit.
NPTEL Online Certification
Courses

Indian Institute of Technology Kharagpur

Cloud Computing
Assignment-Week 6
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10

QUESTION 1:
Fabrication is an attack on:
A) Integrity
B) Confidentiality
C) Authenticity
D) Availability
Correct Answer: C
Detailed Solution: Fabrication is an attack on authenticity.

QUESTION 2:
Reliability and efficiency are basic components of security.
A) True
B) False

Correct Answer: B
Detailed Solution: Confidentiality (Keeping data and resources hidden), Integrity and Availability
(Enabling access to data and resources) are the major components of security. Refer to slide-2
slide of Cloud
Security-I.

QUESTION 3:
Spoofing threat on cloud security is an example of.
A) Deception
B) Disruption
C) Usurpation
D) Disclosure

Correct Answer: A, C
Detailed Solution: Spoofing results in deception and usurpation. Refer to slide 6 of Cloud Security - I.
NPTEL Online Certification
Courses

Indian Institute of Technology Kharagpur

QUESTION 4:
Statement I:: Intrusion Detection System (IDS) scans the incoming messages, and creates alerts when
suspected scans/attacks are in progress.

Statement II: Authentication is the determination of whether or not an operation is allowed by a certain
user.

A) Statement I is TRUE and Statement II is FALSE.


B) Statement II is TRUE and Statement I is FALSE.
C) Both statements are TRUE.
D) Both statements are FALSE.

Correct Answer: A

Detailed Solution: Statement I is correct (Refer slide 24 of Cloud Security


Security-I).
I). Authentication is the
identification of legitimate users (Refer slide 18 of Cloud Security
Security-I).
I). Hence, Statement II is false. Correct
answer is A.

QUESTION 5:
Which of the following is/are hypervisor risks associated with rough hypervisor rootkits?
A) Improper configuration of VM.
B) Hypervisor that hides itself from normal malware detection systems.
C) Hypervisor that creates a covert channel to dump unauthorized cod
code.
D) Vulnerable virtual machine applications like Vmchat, VMftp, Vmcat etc.

Correct Answer: B, C
Detailed Solution: Hypervisor risks associated with rough hypervisor rootkits consist of hypervisors that
hide themselves from normal malware detection systems and hypervisors that create a covert channel to
dump unauthorized code. Refer slide 20 of Cloud Security - II.

QUESTION 6:
In fault tolerance, replication is mirroring/sharing data over disks which are located in separate physical
locations to maintain consistency.

A) True
B) False
NPTEL Online Certification
Courses

Indian Institute of Technology Kharagpur

Correct Answer: A

Detailed Solution: True. Refer slide 15 of Cloud Security - II.

QUESTION 7:
In which of the following web service(s) based security attacks does(do) the attacker send huge amounts of
requests to a certain service, causing denial of service?
A) Injection attack
B) Flooding
C) Cross-site scripting (XSS)
D) Metadata (WSDL) spoofing attack

Correct Answer: B
Detailed Solution: Flooding is the attack where the attacker sends huge amounts of requests to a certain
service, causing
using denial of service. Refer to slide 23 of Cloud Security
Security-II.

QUESTION 8:
When is it better to switch cloud providers?

A) Contract price decrease


B) Provider bankruptcy
C) Provider service shutdown
D) Increase in service quality

Correct Answer: B, C

Detailed Solution: Refer to slide no. 17 of Cloud


Cloud-Security II.

QUESTION 9:
Which of the following Open-source
source tools is/are used to perform TCP SYN traceroutes on the Amazon EC2
platform?

A) wget
B) nmap
C) ipconfig
D) hping

Correct Answer: D
NPTEL Online Certification
Courses

Indian Institute of Technology Kharagpur

Detailed Solution: hping is an open--source


source tool used to perform TCP SYN traceroutes, which iteratively
sends TCP SYN packets with increasing TTLs, until no ACK is received. Refer to slide 12 of Cloud
Security III.

QUESTION 10:
In risk-based access control (RAC), computing security uncertainty is addressed.
A) True
B) False

Correct Answer: B
Detailed Solution: In risk-based
based access control (RAC), computing security uncertainty is not addressed.
Hence, the statement is false. Refer to slide 18 of Cloud Security - IV.

You might also like