Cyber Security and Privacy | Week 7
Session: JULY-DEC 2023
Course Name: Cyber Security and Privacy
Course Link: Click Here
These are Cyber Security and Privacy Nptel Week 7 Assignment 7 Answers
Q1. Which VPN technology uses leased circuits from a service provider and conducts packet switching over these leased circuits?
Secure VPN
Hybrid VPN
Trusted VPN
Transport VPN
Answer: Trusted VPN
Q2. The biometric technology criteria that describe the number of legitimate users who are denied access because of a failure in the biometric device in known as
False reject rate
False accept rate
Crossover error rate
Accountability rate
Answer: False reject rate
These are Cyber Security and Privacy Nptel Week 7 Assignment 7 Answers
Q3. True or False: All traffic exiting from the trusted network should be filtered.
True
False
Answer: True
Q4. What term is used to describe decoy systems designed to lure potential attackers away from critical systems?
Trap
Honeypot
Trace
Sniffer
Answer: Honeypot
These are Cyber Security and Privacy Nptel Week 7 Assignment 7 Answers
Q5. True or False: Signature-based IDPS technology is widely used because many attacks have clear and distinct signatures.
True
False
Answer: True
Q6. The method by which systems determine whether and how to admit a user into a trusted area of the organization is known as
Attribute
Accountability
Access control
Audibility
Answer: Access control
These are Cyber Security and Privacy Nptel Week 7 Assignment 7 Answers
Q7. ——————denotes the rate at which fraudulent users or nonusers are allowed access to systems or areas as a result of a failure in the biometric device. This failure is also known as ————–
False reject rate, Type I error
False accept rate, Type 2 error
False accept rate, Type I error
False reject rate, Type 2 error
Answer: False accept rate, Type I error
These are Cyber Security and Privacy Nptel Week 7 Assignment 7 Answers
Q8. Fill in the blank
——————denotes the rate at which authorised users are denied access to systems or areas as a result of a failure in the biometric device. This failure is also known as ————.
Choose the correct option
False reject rate, Type I error
False accept rate, Type 2 error
False accept rate, Type I error
False reject rate, Type 2 error
Answer: False reject rate, Type 2 error
Q9. Match the following
A. Thresholds 1 Signature-based detection
B. Blacklists and whitelists: 2 Anomaly-based detection
C. Alert settings: 3 Detection-related related programs
D. Code viewing and editing: 4 Specifying which prevention capabilities
Choose the correct option
A-2, B-3, C-1, D-4
A-2, B-1, C-3, D-4
A-1, B-2, C-3, D-4
A-2, B-1, C-4, D-3
Answer: A-2, B-3, C-1, D-4
These are Cyber Security and Privacy Nptel Week 7 Assignment 7 Answers
Q10. Choose the right option to fill in the blanks
(1) ————— initiates network traffic to find and evaluate service ports whereas (2) —————- uses traffic from the target network segment to evaluate the service ports available from hosts on that segment.
1-active vulnerability scanners, 2-passive vulnerability scanners
1-passive vulnerability scanners, 2-active vulnerability scanners
Answer: 1-active vulnerability scanners, 2-passive vulnerability scanners
These are Cyber Security and Privacy Nptel Week 7 Assignment 7 Answers
More Weeks of Cyber Security and Privacy: Click here
More Nptel Courses: Click here

This content is uploaded for study, general information, and reference purpose only.