NPTEL Cyber Security and Privacy Week 1 Assignment Answers 2024
NPTEL Cyber Security and Privacy Week 1 Assignment Answers 2024
1. A malicious email attack targeting a specific user or group of users, appearing to originate from a trusted source is:
- Spear Phishing
- Man in the Middle Attack
- Smurf Attack
- Social media phishing
Answer :- For Answer Click Here
2. A malicious attack where hackers encrypt an organization’s data and demand payment to restore access is known as:
- Spyware
- Ransomware
- Whaling
- Watering hole attack
Answer :-
3. Which of the following characteristics are most likely to be found in a phishing email?
- Sense of urgency and immediate action requests.
- Unusual or inappropriate requests
- Incorrect sender name or email address.
- All of the above.
Answer :-
4. From a managerial perspective, Information Security is generally understood as a:
- Product
- Technology
- Process
- Product, Technology and Process
Answer :- For Answer Click Here
5. The practice of keeping an organization’s network infrastructure secure from unauthorized access is known as:
- Data Security
- Network Security
- Information Security
- Operations Security
Answer :-
6. Which of the following statements most accurately reflects the complex role of technology in cybersecurity?
- Technology acts as both a source of threats and a tool for defense.
- Technology is solely a source of threats and vulnerabilities.
- Technology plays a triple role: source of threats, asset to protect, and defense weapon.
- Technology solely serves as a defense weapon against cyberattacks.
Answer :- For Answer Click Here
7. ___________ is a manipulation technique that exploits human weakness to gain private information, access, or valuables
- Spyware
- Logic Bomb
- Social Engineering
- Man in the Middle Attack
Answer :-
8. True or False: The word “Cyber” in “Cybernetics” originates from the French language.
- True
- False
Answer :-
9. The impact of a cyber security incident on organizations can include:
- Financial Loss
- Reputation Damage
- Regulatory fine
- All the above
Answer :- For Answer Click Here
10. True or False: A Vendor guarantees that their IoT solutions are 100% safe from cyberattacks. This statement can be
- True
- False
Answer :-