Cyber Security and Privacy Week 1 Nptel Answers
Are you looking for Cyber Security and Privacy Week 1 Nptel Answers ? You’ve come to the right place! Access the most accurate answers at Progiez.
Table of Contents

Cyber Security and Privacy Week 1 Nptel Answers (July-Dec 2025)
Que.1 How do spear-phishing attacks differ from general phishing attacks?
A) They use only phone calls as a medium
B) They are randomly sent to thousands of people
C) They target specific individuals with personalized messages
D) They do not involve malware at all
Que.2 What does ransomware typically do to a victim’s files?
A) Deletes them permanently
B) Encrypts them to prevent access
C) Transfers them to another device
D) Makes them publicly available online
Que.3 Which of the following are examples of systems protected under Critical Infrastructure Protection (CIP)?
A) Gaming consoles and home Wi-Fi routers
B) SCADA systems, Industrial Control Systems (ICS), and operational technology
C) Social media networks and entertainment apps
D) Educational platforms and student databases
Que.4 _______________ is the protection of information assets that use, store, or transmit information through the application of policy, education, and technology.
A) Network Security
B) Operations Security
C) Communications Security
D) Information Security
Que.5 _______ is the property of information that describes how data is whole, complete, and uncorrupted.
A) Integrity
B) Availability
C) Confidentiality
D) Accuracy
Que.6 To protect the confidentiality of information, which of the following measures can be taken:
A) Information classification
B) Secure document storage
C) Application of general security policies
D) All the above
Que.7 In the context of cybersecurity, how can technology act as a source of threat?
A) It includes tools that can attack other networks
B) It increases internet traffic for organizations
C) It automates routine business operations
D) Through software that prevents users from sharing information
Que.8 True or False: Information Security is not a process, but a product or a technology.
A) True
B) False
Que.9 ___________ is a manipulation technique that exploits human error to gain private information, access, or valuables.
A) Session Hijacking
B) Salting
C) Social Engineering
D) Smurf Attack
Que.10 Which of the following scenarios represents a breach involving protected health information (PHI)?
A) Sharing a patient’s prescription history along with their name
B) Forwarding anonymous health statistics to a research team
C) Posting a hospital’s general policy on patient intake
D) Transmitting appointment schedules without personal details
Cyber Security and Privacy Week 1 Nptel Answers JUL-DEC 2024
Course name: Cyber Security and Privacy
Course Link: Click Here
For answers or latest updates join our telegram channel: Click here to join
These are Cyber Security and Privacy Week 1 Nptel Answers
Q1.A malicious email attack targeting a specific user or group of users, appearing to originate from a trusted source is:
Spear Phishing
Man in the Middle Attack
Smurf Attack
Social media phishing
Answer: Spear Phishing
Q2.A malicious attack where hackers encrypt an organization’s data and demand payment to restore access is known as:
Spyware
Ransomware
Whaling
Watering hole attack
Answer: Ransomware
For answers or latest updates join our telegram channel: Click here to join
These are Cyber Security and Privacy Week 1 Nptel Assignment Answers
Q3. Which of the following characteristics are most likely to be found in a phishing email?
Sense of urgency and immediate action requests.
Unusual or inappropriate requests
Incorrect sender name or email address.
All of the above.
Answer: All of the above.
Q4.From a managerial perspective, Information Security is generally understood as a:
Product
Technology
Process
Product, Technology and Process
Answer: Product, Technology and Process
For answers or latest updates join our telegram channel: Click here to join
These are Cyber Security and Privacy Week 1 Nptel Answers
Q5.The practice of keeping an organization’s network infrastructure secure from unauthorized access is known as:
Data Security
Network Security
Information Security
Operations Security
Answer: Network Security
Q6. Which of the following statements most accurately reflects the complex role of technology in cybersecurity?
Technology acts as both a source of threats and a tool for defense.
Technology is solely a source of threats and vulnerabilities.
Technology plays a triple role: source of threats, asset to protect, and defense weapon.
Technology solely serves as a defense weapon against cyberattacks.
Answer: Technology plays a triple role: source of threats, asset to protect, and defense weapon.
For answers or latest updates join our telegram channel: Click here to join
These are Cyber Security and Privacy Week 1 Nptel Answers
Q7. _______________ is a manipulation technique that exploits human weakness to gain private information, access, or valuables.
Spyware
Logic Bomb
Social Engineering
Man in the Middle Attack
Answer: Social Engineering
Q8. True or False: The word “Cyber” in “Cybernetics” originates from the French language.
True
False
Answer: False
For answers or latest updates join our telegram channel: Click here to join
These are Cyber Security and Privacy Week 1 Nptel Answers
Q9. The impact of a cyber security incident on organizations can include:
Financial Loss
Reputation Damage
Regulatory fine
All the above
Answer: All the above
Q10. True or False: A Vendor guarantees that their IoT solutions are 100% safe from cyberattacks. This statement can be
True
False
Answer: False
For answers or latest updates join our telegram channel: Click here to join
These are Cyber Security and Privacy Week 1 Nptel Answers
More Weeks of Cyber Security and Privacy: Click here
More Nptel Courses: https://progiez.com/nptel-assignment-answers










