Cyber Security and Privacy Week 2 NPTEL Assignment Answers 2025

Need help with this week’s assignment? Get detailed and trusted solutions for Cyber Security and Privacy Week 2 NPTEL Assignment Answers. Our expert-curated answers help you solve your assignments faster while deepening your conceptual clarity.

✅ Subject: Cyber Security and Privacy
📅 Week: 2
🎯 Session: NPTEL 2025 July-October
🔗 Course Link: Click Here
🔍 Reliability: Verified and expert-reviewed answers
📌 Trusted By: 5000+ Students

For complete and in-depth solutions to all weekly assignments, check out 👉 NPTEL Cyber Security and Privacy Week 2 Assignment Answers

🚀 Stay ahead in your NPTEL journey with fresh, updated solutions every week!

NPTEL Cyber Security and Privacy Week 2 Assignment Answers 2025

1. What is the primary purpose of the McCumber Cube?

  • To develop network security protocols
  • To create operating systems
  • To establish and evaluate information security programs
  • To analyze network traffic performance
Answer : See Answers

2. Consider the following statements
a. The first dimension of the McCumber cube identifies the goals to protect the cyber world.
b. The second dimension of the McCumber cube focuses on the problems of protecting all of the states of data in the cyber world.
c. The third dimension of the McCumber cube defines the types of controls used to protect the cyber world.
Which of the above statements are True?

  • Only a is true
  • a and b are true
  • b and c are true
  • a,b,and c are true
Answer :

3. In a malware detection system, when legitimate business software is incorrectly identified as malicious, this represents:

  • True Positive (TP)
  • False Positive (FP)
  • True Negative (TN)
  • False Negative (FN)
Answer :

4. True or False: A False Negative in malware detection means the system correctly identifies a safe file as non-malicious.

  • True
  • False
Answer :

5. A vulnerability in cybersecurity is best defined as:

  • A malicious program designed to damage systems
  • A security patch released by software vendors
  • A method used by attackers to gain unauthorized access
  • A weakness or flaw in technology, processes, or human behavior that leaves systems open to exploitation
Answer : See Answers

6. An exploit is primarily:

  • A weakness in system security that needs patching
  • A technique used to compromise a system
  • A novel self-protecting antivirus software
  • A security framework for risk assessment
Answer :

7. rue or False: Accuracy is an attribute of information that describes how data is genuine or original rather than reproduced or fabricated.

  • True
  • False
Answer :

8. What is a recommended defense against phishing emails?

  • Always open attachments to check content
  • Click links only if the sender is familiar
  • Verify the source and avoid clicking suspicious links
  • Forward the email to colleagues
Answer :

9. Which of the following are best practices for balancing information security and access? (Select all that apply. More than one answer may be possible)

  • Regular review of user access rights
  • Implementing role-based access control
  • Granting blanket access to all employees
  • Monitoring and auditing access logs
Answer :

10. In an information system, which component is responsible for enabling communication and data transfer between devices?

  • Hardware
  • Software
  • Networks
  • Data
Answer : See Answers

NPTEL Cyber Security and Privacy Week 2 Assignment Answers 2024

2. What aspect emerges from the intersection of 3 components of Information Security?

a. Technology
b. Policy
c. Human Security
d. None of the above

Answer: b
Explanation: The intersection of technology, people, and process in the McCumber Cube leads to the policy component, which guides secure behavior and practices.


3. ————-, authentication and authorization are means to ensure CIA.

a. Investigation
b. Identification
c. Classification
d. Verification

Answer: b
Explanation: Identification, authentication, and authorization are core processes that help enforce Confidentiality, Integrity, and Availability.


4. Should all 27 cells of McCumber’s Cube be addressed with the same priority?

a. True
b. False

Answer: b
Explanation: Not all cells hold the same priority; their relevance may vary depending on organizational goals, threats, and vulnerabilities.


5. Which of the following is/ are the design principles of high availability systems?

a. Eliminate single points of failure
b. Ensure reliable crossover
c. Identify failures in real time
d. All the above

Answer: d
Explanation: High availability systems rely on all three principles to maintain uptime and minimize disruptions.


6. In ensuring confidentiality, what is the crucial process that involves classifying information and individuals, and mapping them based on the level of access?

a. Identification
b. Authentication
c. Authorization
d. Encryption

Answer: c
Explanation: Authorization is the process that decides who has access to what information based on classification and roles.


7. In addition to cryptography, a number of measures may be used for confidentiality, including:

a. Information classification
b. Secure document storage
c. Application of general security policies
d. All the above

Answer: d
Explanation: Confidentiality isn’t limited to encryption—it also involves policies, secure storage, and information classification.


8. When a control provides assurance that every activity undertaken can be attributed to a named person or automated process, it is known as:

a. Integrity
b. Accountability
c. Accessibility
d. Authenticity

Answer: b
Explanation: Accountability ensures actions can be traced to their originator, which is essential for audits and security.


9. Identify the components of Information Security

a. Network Security
b. Computer & Data Security
c. Management of Information Security
d. All of the above

Answer: d
Explanation: All listed components contribute to a comprehensive information security strategy.


10. Which are the three types of power McCumber’s Cube identifies?

a. Technologies
b. Policies and Practices
c. People
d. All the above

Answer: d
Explanation: McCumber’s Cube includes all three dimensions—technology, policy, and people—as essential to securing information.