Cyber Security and Privacy Week 1 Nptel Answers

Are you looking for Cyber Security and Privacy Week 1 Nptel Answers ? You’ve come to the right place! Access the most accurate answers at Progiez.


Cyber Security and Privacy Week 1 Nptel Answers
Cyber Security and Privacy Week 1 Nptel Answers

Cyber Security and Privacy Week 1 Nptel Answers (July-Dec 2025)


Que.1 How do spear-phishing attacks differ from general phishing attacks?
A) They use only phone calls as a medium
B) They are randomly sent to thousands of people
C) They target specific individuals with personalized messages
D) They do not involve malware at all

View Answer


Que.2 What does ransomware typically do to a victim’s files?
A) Deletes them permanently
B) Encrypts them to prevent access
C) Transfers them to another device
D) Makes them publicly available online

View Answer


Que.3 Which of the following are examples of systems protected under Critical Infrastructure Protection (CIP)?
A) Gaming consoles and home Wi-Fi routers
B) SCADA systems, Industrial Control Systems (ICS), and operational technology
C) Social media networks and entertainment apps
D) Educational platforms and student databases

View Answer


Que.4 _______________ is the protection of information assets that use, store, or transmit information through the application of policy, education, and technology.
A) Network Security
B) Operations Security
C) Communications Security
D) Information Security

View Answer


Que.5 _______ is the property of information that describes how data is whole, complete, and uncorrupted.
A) Integrity
B) Availability
C) Confidentiality
D) Accuracy

View Answer


Que.6 To protect the confidentiality of information, which of the following measures can be taken:
A) Information classification
B) Secure document storage
C) Application of general security policies
D) All the above

See also  Foundations of Virtual Reality Nptel Week 1 Answers

View Answer


Que.7 In the context of cybersecurity, how can technology act as a source of threat?
A) It includes tools that can attack other networks
B) It increases internet traffic for organizations
C) It automates routine business operations
D) Through software that prevents users from sharing information

View Answer


Que.8 True or False: Information Security is not a process, but a product or a technology.
A) True
B) False

View Answer


Que.9 ___________ is a manipulation technique that exploits human error to gain private information, access, or valuables.
A) Session Hijacking
B) Salting
C) Social Engineering
D) Smurf Attack

View Answer


Que.10 Which of the following scenarios represents a breach involving protected health information (PHI)?
A) Sharing a patient’s prescription history along with their name
B) Forwarding anonymous health statistics to a research team
C) Posting a hospital’s general policy on patient intake
D) Transmitting appointment schedules without personal details

View Answer


Cyber Security and Privacy Week 1 Nptel Answers JUL-DEC 2024

Course name: Cyber Security and Privacy

Course Link: Click Here

For answers or latest updates join our telegram channel: Click here to join

These are Cyber Security and Privacy Week 1 Nptel Answers


Q1.A malicious email attack targeting a specific user or group of users, appearing to originate from a trusted source is:
Spear Phishing
Man in the Middle Attack
Smurf Attack
Social media phishing

Answer: Spear Phishing


Q2.A malicious attack where hackers encrypt an organization’s data and demand payment to restore access is known as:
Spyware
Ransomware
Whaling
Watering hole attack

Answer: Ransomware


For answers or latest updates join our telegram channel: Click here to join

See also  Human Physiology Nptel Week 1 Assignment Answers

These are Cyber Security and Privacy Week 1 Nptel Assignment Answers


Q3. Which of the following characteristics are most likely to be found in a phishing email?
Sense of urgency and immediate action requests.
Unusual or inappropriate requests
Incorrect sender name or email address.
All of the above.

Answer: All of the above.


Q4.From a managerial perspective, Information Security is generally understood as a:
Product
Technology
Process
Product, Technology and Process

Answer: Product, Technology and Process


For answers or latest updates join our telegram channel: Click here to join

These are Cyber Security and Privacy Week 1 Nptel Answers


Q5.The practice of keeping an organization’s network infrastructure secure from unauthorized access is known as:
Data Security
Network Security
Information Security
Operations Security

Answer: Network Security


Q6. Which of the following statements most accurately reflects the complex role of technology in cybersecurity?
Technology acts as both a source of threats and a tool for defense.
Technology is solely a source of threats and vulnerabilities.
Technology plays a triple role: source of threats, asset to protect, and defense weapon.
Technology solely serves as a defense weapon against cyberattacks.

Answer: Technology plays a triple role: source of threats, asset to protect, and defense weapon.


For answers or latest updates join our telegram channel: Click here to join

These are Cyber Security and Privacy Week 1 Nptel Answers


Q7. _______________ is a manipulation technique that exploits human weakness to gain private information, access, or valuables.
Spyware
Logic Bomb
Social Engineering
Man in the Middle Attack

Answer: Social Engineering


Q8. True or False: The word “Cyber” in “Cybernetics” originates from the French language.
True
False

See also  Deep Learning IIT Ropar Week 1 Nptel Assignment Answers

Answer: False


For answers or latest updates join our telegram channel: Click here to join

These are Cyber Security and Privacy Week 1 Nptel Answers


Q9. The impact of a cyber security incident on organizations can include:
Financial Loss
Reputation Damage
Regulatory fine
All the above

Answer: All the above


Q10. True or False: A Vendor guarantees that their IoT solutions are 100% safe from cyberattacks. This statement can be
True
False

Answer: False


For answers or latest updates join our telegram channel: Click here to join

These are Cyber Security and Privacy Week 1 Nptel Answers

More Weeks of Cyber Security and Privacy: Click here

More Nptel Courses: https://progiez.com/nptel-assignment-answers


These are Cyber Security and Privacy Week 1 Nptel Assignment Answers