Need help with this week’s assignment? Get detailed and trusted solutions for Cyber Security and Privacy Week 1 NPTEL Assignment Answers. Our expert-curated answers help you solve your assignments faster while deepening your conceptual clarity.
✅ Subject: Cyber Security and Privacy
📅 Week: 1
🎯 Session: NPTEL 2025 July-October
🔗 Course Link: Click Here
🔍 Reliability: Verified and expert-reviewed answers
📌 Trusted By: 5000+ Students
For complete and in-depth solutions to all weekly assignments, check out 👉 NPTEL Cyber Security and Privacy Week 1 Assignment Answers
🚀 Stay ahead in your NPTEL journey with fresh, updated solutions every week!
NPTEL Cyber Security and Privacy Week 1 Assignment Answers 2025
1. How do spear-phishing attacks differ from general phishing attacks?
- They use only phone calls as a medium
- They are randomly sent to thousands of people
- They target specific individuals with personalized messages
- They do not involve malware at all
Answer : For Answes Click Here
2. What does ransomware typically do to a victim’s files?
- Deletes them permanently
- Encrypts them to prevent access
- Transfers them to another device
- Makes them publicly available online
Answer :
3. Which of the following are examples of systems protected under Critical Infrastructure Protection (CIP)?
- Gaming consoles and home Wi-Fi routers
- SCADA systems, Industrial Control Systems (ICS), and operational technology
- Social media networks and entertainment apps
- Educational platforms and student databases
Answer :
Looking for Cyber Security and Privacy assignment answers? Explore year-wise assignment answers in one place!
4. _____________ is the protection of information assets that use, store, or transmit information through the application of policy, education, and technology.
- Network Security
- Operations Security
- Communications Security
- Information Security
Answer :
5. ____________ is the property of information that describes how data is whole, complete, and uncorrupted.
- Integrity
- Availability
- Confidentiality
- Accuracy
Answer : For Answes Click Here
6. To protect the confidentiality of information, which of the following measures can be taken:
- Information classification
- Secure document storage
- Application of general security policies
- All the above
Answer :
7. In the context of cybersecurity, how can technology act as a source of threat?
- It includes tools that can attack other networks
- It increases internet traffic for organizations
- It automates routine business operations
- Through software that prevents users from sharing information
Answer :
8. True or False: Information Security is not a process, but a product or a technology.
- True
- False
Answer :
9. ________________ is a manipulation technique that exploits human error to gain private information, access, or valuables
- Session Hijacking
- Salting
- Social Engineering
- Smurf Attack
Answer :
10. Which of the following scenarios represents a breach involving protected health information (PHI)?
- Sharing a patient’s prescription history along with their name
- Forwarding anonymous health statistics to a research team
- Posting a hospital’s general policy on patient intake
- Transmitting appointment schedules without personal details
Answer : For Answes Click Here
NPTEL Cyber Security and Privacy Week 1 Assignment Answers 2024
1. A malicious email attack targeting a specific user or group of users, appearing to originate from a trusted source is:
a. Spear Phishing
b. Man in the Middle Attack
c. Smurf Attack
d. Social media phishing
✅ Answer: a
📘 Explanation: Spear phishing is a targeted form of phishing where attackers tailor their messages to a specific individual or organization, making the email appear trustworthy.
2. A malicious attack where hackers encrypt an organization’s data and demand payment to restore access is known as:
a. Spyware
b. Ransomware
c. Whaling
d. Watering hole attack
✅ Answer: b
📘 Explanation: Ransomware encrypts data and demands ransom to decrypt it. It’s one of the most damaging types of cyberattacks.
3. Which of the following characteristics are most likely to be found in a phishing email?
a. Sense of urgency and immediate action requests.
b. Unusual or inappropriate requests
c. Incorrect sender name or email address.
d. All of the above.
✅ Answer: d
📘 Explanation: Phishing emails commonly create urgency, come from odd senders, and ask users to do something risky like clicking malicious links.
4. From a managerial perspective, Information Security is generally understood as a:
a. Product
b. Technology
c. Process
d. Product, Technology and Process
✅ Answer: c
📘 Explanation: Managers typically treat information security as a process, involving policy, procedures, monitoring, and continual improvement.
5. The practice of keeping an organization’s network infrastructure secure from unauthorized access is known as:
a. Data Security
b. Network Security
c. Information Security
d. Operations Security
✅ Answer: b
📘 Explanation: Network Security focuses on protecting networking infrastructure from unauthorized access, misuse, or theft.
6. Which of the following statements most accurately reflects the complex role of technology in cybersecurity?
a. Technology acts as both a source of threats and a tool for defense.
b. Technology is solely a source of threats and vulnerabilities.
c. Technology plays a triple role: source of threats, asset to protect, and defense weapon.
d. Technology solely serves as a defense weapon against cyberattacks.
✅ Answer: c
📘 Explanation: Technology in cybersecurity is multifaceted—it can be vulnerable, valuable, and protective at the same time.
7. ___________ is a manipulation technique that exploits human weakness to gain private information, access, or valuables
a. Spyware
b. Logic Bomb
c. Social Engineering
d. Man in the Middle Attack
✅ Answer: c
📘 Explanation: Social Engineering involves tricking people into revealing sensitive information by exploiting trust, fear, or urgency.
8. True or False: The word “Cyber” in “Cybernetics” originates from the French language.
a. True
b. False
✅ Answer: b
📘 Explanation: The word “Cyber” comes from the Greek word “kybernetes” meaning “steersman” or “governor,” not French.
9. The impact of a cybersecurity incident on organizations can include:
a. Financial Loss
b. Reputation Damage
c. Regulatory fine
d. All the above
✅ Answer: d
📘 Explanation: Cyberattacks can cause financial damage, reputational harm, and legal penalties due to non-compliance.
10. True or False: A Vendor guarantees that their IoT solutions are 100% safe from cyberattacks. This statement can be
a. True
b. False
✅ Answer: b
📘 Explanation: No technology is ever 100% secure. Such guarantees are misleading as new threats evolve constantly.


