NPTEL Cyber Security and Privacy Week 1 Assignment Answers 2024

NPTEL Cyber Security and Privacy Week 1 Assignment Answers 2024

NPTEL Cyber Security and Privacy Week 1 Assignment Answers 2024

1. A malicious email attack targeting a specific user or group of users, appearing to originate from a trusted source is:

  • Spear Phishing
  • Man in the Middle Attack
  • Smurf Attack
  • Social media phishing
Answer :- For Answer Click Here

2. A malicious attack where hackers encrypt an organization’s data and demand payment to restore access is known as:

  • Spyware
  • Ransomware
  • Whaling
  • Watering hole attack
Answer :- 

3. Which of the following characteristics are most likely to be found in a phishing email?

  • Sense of urgency and immediate action requests.
  • Unusual or inappropriate requests
  • Incorrect sender name or email address.
  • All of the above.
Answer :- 

4. From a managerial perspective, Information Security is generally understood as a:

  • Product
  • Technology
  • Process
  • Product, Technology and Process
Answer :- For Answer Click Here

5. The practice of keeping an organization’s network infrastructure secure from unauthorized access is known as:

  • Data Security
  • Network Security
  • Information Security
  • Operations Security
Answer :- 

6. Which of the following statements most accurately reflects the complex role of technology in cybersecurity?

  • Technology acts as both a source of threats and a tool for defense.
  • Technology is solely a source of threats and vulnerabilities.
  • Technology plays a triple role: source of threats, asset to protect, and defense weapon.
  • Technology solely serves as a defense weapon against cyberattacks.
Answer :- For Answer Click Here

7. ___________ is a manipulation technique that exploits human weakness to gain private information, access, or valuables

  • Spyware
  • Logic Bomb
  • Social Engineering
  • Man in the Middle Attack
Answer :- 

8. True or False: The word “Cyber” in “Cybernetics” originates from the French language.

  • True
  • False
Answer :- 

9. The impact of a cyber security incident on organizations can include:

  • Financial Loss
  • Reputation Damage
  • Regulatory fine
  • All the above
Answer :- For Answer Click Here

10. True or False: A Vendor guarantees that their IoT solutions are 100% safe from cyberattacks. This statement can be

  • True
  • False
Answer :-