Cyber Security and Privacy | Week 1

Session: JUL-DEC 2024

Course name: Cyber Security and Privacy

Course Link: Click Here

For answers or latest updates join our telegram channel: Click here to join

These are Cyber Security and Privacy Week 1 Nptel Assignment Answers


Q1.A malicious email attack targeting a specific user or group of users, appearing to originate from a trusted source is:
Spear Phishing
Man in the Middle Attack
Smurf Attack
Social media phishing

Answer: Spear Phishing


Q2.A malicious attack where hackers encrypt an organization’s data and demand payment to restore access is known as:
Spyware
Ransomware
Whaling
Watering hole attack

Answer: Ransomware


For answers or latest updates join our telegram channel: Click here to join

These are Cyber Security and Privacy Week 1 Nptel Assignment Answers


Q3. Which of the following characteristics are most likely to be found in a phishing email?
Sense of urgency and immediate action requests.
Unusual or inappropriate requests
Incorrect sender name or email address.
All of the above.

Answer: All of the above.


Q4.From a managerial perspective, Information Security is generally understood as a:
Product
Technology
Process
Product, Technology and Process

Answer: Product, Technology and Process


For answers or latest updates join our telegram channel: Click here to join

These are Cyber Security and Privacy Week 1 Nptel Assignment Answers


Q5.The practice of keeping an organization’s network infrastructure secure from unauthorized access is known as:
Data Security
Network Security
Information Security
Operations Security

Answer: Network Security


Q6. Which of the following statements most accurately reflects the complex role of technology in cybersecurity?
Technology acts as both a source of threats and a tool for defense.
Technology is solely a source of threats and vulnerabilities.
Technology plays a triple role: source of threats, asset to protect, and defense weapon.
Technology solely serves as a defense weapon against cyberattacks.

See also  Cyber Security and Privacy | Week 2

Answer: Technology plays a triple role: source of threats, asset to protect, and defense weapon.


For answers or latest updates join our telegram channel: Click here to join

These are Cyber Security and Privacy Week 1 Nptel Assignment Answers


Q7. _______________ is a manipulation technique that exploits human weakness to gain private information, access, or valuables.
Spyware
Logic Bomb
Social Engineering
Man in the Middle Attack

Answer: Social Engineering


Q8. True or False: The word “Cyber” in “Cybernetics” originates from the French language.
True
False

Answer: False


For answers or latest updates join our telegram channel: Click here to join

These are Cyber Security and Privacy Week 1 Nptel Assignment Answers


Q9. The impact of a cyber security incident on organizations can include:
Financial Loss
Reputation Damage
Regulatory fine
All the above

Answer: All the above


Q10. True or False: A Vendor guarantees that their IoT solutions are 100% safe from cyberattacks. This statement can be
True
False

Answer: False


For answers or latest updates join our telegram channel: Click here to join

These are Cyber Security and Privacy Week 1 Nptel Assignment Answers

More Weeks of Cyber Security and Privacy: Click here

More Nptel Courses: https://progiez.com/nptel-assignment-answers


These are Cyber Security and Privacy Week 1 Nptel Assignment Answers