Cyber Security and Privacy | Week 1
Session: JUL-DEC 2024
Course name: Cyber Security and Privacy
Course Link: Click Here
For answers or latest updates join our telegram channel: Click here to join
These are Cyber Security and Privacy Week 1 Nptel Assignment Answers
Q1.A malicious email attack targeting a specific user or group of users, appearing to originate from a trusted source is:
Spear Phishing
Man in the Middle Attack
Smurf Attack
Social media phishing
Answer: Spear Phishing
Q2.A malicious attack where hackers encrypt an organization’s data and demand payment to restore access is known as:
Spyware
Ransomware
Whaling
Watering hole attack
Answer: Ransomware
For answers or latest updates join our telegram channel: Click here to join
These are Cyber Security and Privacy Week 1 Nptel Assignment Answers
Q3. Which of the following characteristics are most likely to be found in a phishing email?
Sense of urgency and immediate action requests.
Unusual or inappropriate requests
Incorrect sender name or email address.
All of the above.
Answer: All of the above.
Q4.From a managerial perspective, Information Security is generally understood as a:
Product
Technology
Process
Product, Technology and Process
Answer: Product, Technology and Process
For answers or latest updates join our telegram channel: Click here to join
These are Cyber Security and Privacy Week 1 Nptel Assignment Answers
Q5.The practice of keeping an organization’s network infrastructure secure from unauthorized access is known as:
Data Security
Network Security
Information Security
Operations Security
Answer: Network Security
Q6. Which of the following statements most accurately reflects the complex role of technology in cybersecurity?
Technology acts as both a source of threats and a tool for defense.
Technology is solely a source of threats and vulnerabilities.
Technology plays a triple role: source of threats, asset to protect, and defense weapon.
Technology solely serves as a defense weapon against cyberattacks.
Answer: Technology plays a triple role: source of threats, asset to protect, and defense weapon.
For answers or latest updates join our telegram channel: Click here to join
These are Cyber Security and Privacy Week 1 Nptel Assignment Answers
Q7. _______________ is a manipulation technique that exploits human weakness to gain private information, access, or valuables.
Spyware
Logic Bomb
Social Engineering
Man in the Middle Attack
Answer: Social Engineering
Q8. True or False: The word “Cyber” in “Cybernetics” originates from the French language.
True
False
Answer: False
For answers or latest updates join our telegram channel: Click here to join
These are Cyber Security and Privacy Week 1 Nptel Assignment Answers
Q9. The impact of a cyber security incident on organizations can include:
Financial Loss
Reputation Damage
Regulatory fine
All the above
Answer: All the above
Q10. True or False: A Vendor guarantees that their IoT solutions are 100% safe from cyberattacks. This statement can be
True
False
Answer: False
For answers or latest updates join our telegram channel: Click here to join
These are Cyber Security and Privacy Week 1 Nptel Assignment Answers
More Weeks of Cyber Security and Privacy: Click here
More Nptel Courses: https://progiez.com/nptel-assignment-answers