Cyber Security and Privacy | Week 7

Session: JULY-DEC 2023

Course Name: Cyber Security and Privacy

Course Link: Click Here

These are Cyber Security and Privacy Nptel Week 7 Assignment 7 Answers


Q1. Which VPN technology uses leased circuits from a service provider and conducts packet switching over these leased circuits?
Secure VPN
Hybrid VPN
Trusted VPN
Transport VPN

Answer: Trusted VPN


Q2. The biometric technology criteria that describe the number of legitimate users who are denied access because of a failure in the biometric device in known as
False reject rate
False accept rate
Crossover error rate
Accountability rate

Answer: False reject rate


These are Cyber Security and Privacy Nptel Week 7 Assignment 7 Answers


Q3. True or False: All traffic exiting from the trusted network should be filtered.
True
False

Answer: False


Q4. What term is used to describe decoy systems designed to lure potential attackers away from critical systems?
Trap
Honeypot
Trace
Sniffer

Answer: Honeypot


These are Cyber Security and Privacy Nptel Week 7 Assignment 7 Answers


Q5. True or False: Signature-based IDPS technology is widely used because many attacks have clear and distinct signatures.
True
False

Answer: True


Q6. The method by which systems determine whether and how to admit a user into a trusted area of the organization is known as
Attribute
Accountability
Access control
Audibility

Answer: Access control


These are Cyber Security and Privacy Nptel Week 7 Assignment 7 Answers


Q7. ——————denotes the rate at which fraudulent users or nonusers are allowed access to systems or areas as a result of a failure in the biometric device. This failure is also known as ————–
False reject rate, Type I error
False accept rate, Type 2 error
False accept rate, Type I error
False reject rate, Type 2 error

Answer: False accept rate, Type 2 error


These are Cyber Security and Privacy Nptel Week 7 Assignment 7 Answers


Q8. Fill in the blank
——————denotes the rate at which authorised users are denied access to systems or areas as a result of a failure in the biometric device. This failure is also known as ————.
Choose the correct option

False reject rate, Type I error
False accept rate, Type 2 error
False accept rate, Type I error
False reject rate, Type 2 error

Answer: False reject rate, Type I error


Q9. Match the following
A. Thresholds 1 Signature-based detection
B. Blacklists and whitelists: 2 Anomaly-based detection
C. Alert settings: 3 Detection-related related programs
D. Code viewing and editing: 4 Specifying which prevention capabilities
Choose the correct option

A-2, B-3, C-1, D-4
A-2, B-1, C-3, D-4
A-1, B-2, C-3, D-4
A-2, B-1, C-4, D-3

Answer: A-2, B-1, C-4, D-3


These are Cyber Security and Privacy Nptel Week 7 Assignment 7 Answers


Q10. Choose the right option to fill in the blanks
(1) ————— initiates network traffic to find and evaluate service ports whereas (2) —————- uses traffic from the target network segment to evaluate the service ports available from hosts on that segment.

1-active vulnerability scanners, 2-passive vulnerability scanners
1-passive vulnerability scanners, 2-active vulnerability scanners

Answer: 1-active vulnerability scanners, 2-passive vulnerability scanners


These are Cyber Security and Privacy Nptel Week 7 Assignment 7 Answers


More Weeks of Cyber Security and Privacy: Click here

More Nptel Courses: Click here

These are Cyber Security and Privacy Nptel Week 7 Assignment 7 Answers
The content uploaded on this website is for reference purposes only. Please do it yourself first.