Please do not message repeatedly. You will get the answer before the deadline.

Course Content
Week 1 Assignment Answers (Free)
0/1
Week 2 Assignment Answers
0/1
Week 3 Assignment Answers
0/1
Week 4 Assignment Answers
0/1
Week 5 Assignment Answers
0/1
Week 6 Assignment Answers
0/1
Week 7 Assignment Answers
0/1
Week 8 Assignment Answers
0/1
Week 9 Assignment Answers
0/1
Week 10 Assignment Answers
0/1
Week 11 Assignment Answers
0/1
Week 12 Assignment Answers
0/1
NPTEL Cyber Security and Privacy Assignment Answers 2024 (July-October)
    About Lesson

    1. A malicious email attack targeting a specific user or group of users, appearing to originate from a trusted source is:

    • Spear Phishing
    • Man in the Middle Attack
    • Smurf Attack
    • Social media phishing
    Answer :- a

    2. A malicious attack where hackers encrypt an organization’s data and demand payment to restore access is known as:

    • Spyware
    • Ransomware
    • Whaling
    • Watering hole attack
    Answer :- b

    3. Which of the following characteristics are most likely to be found in a phishing email?

    • Sense of urgency and immediate action requests.
    • Unusual or inappropriate requests
    • Incorrect sender name or email address.
    • All of the above.
    Answer :- d

    4. From a managerial perspective, Information Security is generally understood as a:

    • Product
    • Technology
    • Process
    • Product, Technology and Process
    Answer :- c

    5. The practice of keeping an organization’s network infrastructure secure from unauthorized access is known as:

    • Data Security
    • Network Security
    • Information Security
    • Operations Security
    Answer :- b

    6. Which of the following statements most accurately reflects the complex role of technology in cybersecurity?

    • Technology acts as both a source of threats and a tool for defense.
    • Technology is solely a source of threats and vulnerabilities.
    • Technology plays a triple role: source of threats, asset to protect, and defense weapon.
    • Technology solely serves as a defense weapon against cyberattacks.
    Answer :- c

    7. ___________ is a manipulation technique that exploits human weakness to gain private information, access, or valuables

    • Spyware
    • Logic Bomb
    • Social Engineering
    • Man in the Middle Attack
    Answer :- c

    8. True or False: The word “Cyber” in “Cybernetics” originates from the French language.

    • True
    • False
    Answer :- b

    9. The impact of a cyber security incident on organizations can include:

    • Financial Loss
    • Reputation Damage
    • Regulatory fine
    • All the above
    Answer :- d

    10. True or False: A Vendor guarantees that their IoT solutions are 100% safe from cyberattacks. This statement can be

    • True
    • False
    Answer :- b
    0% Complete