Need help with this week’s assignment? Get detailed and trusted solutions for Cyber Security and Privacy Week 7 NPTEL Assignment Answers. Our expert-curated answers help you solve your assignments faster while deepening your conceptual clarity.
✅ Subject: Cyber Security and Privacy
📅 Week: 7
🎯 Session: NPTEL 2025 July-October
🔗 Course Link: Click Here
🔍 Reliability: Verified and expert-reviewed answers
📌 Trusted By: 5000+ Students
For complete and in-depth solutions to all weekly assignments, check out 👉 NPTEL Cyber Security and Privacy Week 7 Assignment Answers
🚀 Stay ahead in your NPTEL journey with fresh, updated solutions every week!
NPTEL Cyber Security and Privacy Week 7 Assignment Answers 2025
1. ______________ is the principle that an individual is entrusted to safeguard and control equipment, keying material, and information and is answerable to proper authority for the loss or misuse of that equipment or information.
- Auditability
- Accountability
- Confidentiality
- Responsibility
Answer : See Answers
2. Which of the following rings provides the least privileges in an Operating System?
- Ring 0
- Ring 1
- Ring 2
- Ring 3
Answer :
3. Which of the following is not true about asymmetric encryption?
- Asymmetric encryption incorporates mathematical operations involving both a public key and a private key to encipher or decipher a message.
- Asymmetric encryption relies on asymmetric cryptography, also known as private key cryptography.
- Rivest Shamir Adleman (RSA) is an example of asymmetric encryption.
- Asymmetric cryptography has two primary use cases: authentication and confidentiality.
Answer :
4. Which team is responsible for defending against cyber threats by implementing security measures and monitoring systems for suspicious activities?
- Red Team
- Yellow Team
- Green Team
- Blue Team
Answer :
5. True or False : Attribution, the process of identifying the perpetrators of cyber attacks, is easily achievable in cyberspace.
- True
- False
Answer :
6. What does the “Command and Control” stage of the Intrusion Kill Chain involve?
- Gaining initial access to target system
- Executing malicious code on target system
- Establishing a communication channel to remotely access the compromised system.
- Exploiting vulnerabilities to gain control of target system
Answer : See Answers
7. Which layer of the OSI model provides reliable data transfer and error control of connections?
- Network layer
- Data Link layer
- Physical layer
- Transport layer
Answer :
8. MSQ: Which of the following statements about ethical hacking is/are correct ? (Select all that apply. More than one answer may be possible)
- Ethical hackers operate with explicit permission from the organization
- Ethical hackers communicate findings to the organization.
- Ethical hackers exploit a system’s vulnerabilities for personal gain, without a formal agreement.
- Ethical hacking is a proactive measure for security posture.
Answer :
9. Which of the following statement is true?
- TCP is connectionless, and UDP is connection-oriented
- TCP is connection-oriented, and UDP is connectionless
- Both TCP and UDP are connectionless
- Both TCP and UDP are connection-oriented
Answer :
10. What is the primary function of a Demilitarized Zone (DMZ) in network security architecture?
- A special VPN to Increase the network speed for internal users
- Create an isolated buffer zone for public-facing services, separating them from the internal network
- Connect all internal devices directly to internet
- Encrypt all outgoing network traffic
Answer : See Answers

