Course Content
Week 1 Assignment Answers (Free)
0/1
Week 2 Assignment Answers
0/1
Week 3 Assignment Answers
0/1
Week 4 Assignment Answers
0/1
Week 5 Assignment Answers
0/1
Week 6 Assignment Answers
0/1
Week 7 Assignment Answers
0/1
Week 8 Assignment Answers
0/1
Week 9 Assignment Answers
0/1
Week 10 Assignment Answers
0/1
Week 11 Assignment Answers
0/1
Week 12 Assignment Answers
0/1
NPTEL Cyber Security and Privacy Assignment Answers 2024 (July-October)

1. A malicious email attack targeting a specific user or group of users, appearing to originate from a trusted source is:

  • Spear Phishing
  • Man in the Middle Attack
  • Smurf Attack
  • Social media phishing
Answer :- a

2. A malicious attack where hackers encrypt an organization’s data and demand payment to restore access is known as:

  • Spyware
  • Ransomware
  • Whaling
  • Watering hole attack
Answer :- b

3. Which of the following characteristics are most likely to be found in a phishing email?

  • Sense of urgency and immediate action requests.
  • Unusual or inappropriate requests
  • Incorrect sender name or email address.
  • All of the above.
Answer :- d

4. From a managerial perspective, Information Security is generally understood as a:

  • Product
  • Technology
  • Process
  • Product, Technology and Process
Answer :- c

5. The practice of keeping an organization’s network infrastructure secure from unauthorized access is known as:

  • Data Security
  • Network Security
  • Information Security
  • Operations Security
Answer :- b

6. Which of the following statements most accurately reflects the complex role of technology in cybersecurity?

  • Technology acts as both a source of threats and a tool for defense.
  • Technology is solely a source of threats and vulnerabilities.
  • Technology plays a triple role: source of threats, asset to protect, and defense weapon.
  • Technology solely serves as a defense weapon against cyberattacks.
Answer :- c

7. ___________ is a manipulation technique that exploits human weakness to gain private information, access, or valuables

  • Spyware
  • Logic Bomb
  • Social Engineering
  • Man in the Middle Attack
Answer :- c

8. True or False: The word “Cyber” in “Cybernetics” originates from the French language.

  • True
  • False
Answer :- b

9. The impact of a cyber security incident on organizations can include:

  • Financial Loss
  • Reputation Damage
  • Regulatory fine
  • All the above
Answer :- d

10. True or False: A Vendor guarantees that their IoT solutions are 100% safe from cyberattacks. This statement can be

  • True
  • False
Answer :- b
0% Complete