Cyber Security and Privacy Week 2 Nptel Answers

Are you looking for Cyber Security and Privacy Week 2 Nptel Answers ? You’ve come to the right place! Access the most accurate answers at Progiez.


These are Cyber Security and Privacy Week 2 Nptel 2024 Answers
These are Cyber Security and Privacy Week 2 Nptel Answers

Cyber Security and Privacy Week 2 Nptel Answers (July-Dec 2025)


Question 1. What is the primary purpose of the McCumber Cube?
a) To develop network security protocols
b) To create operating systems
c) To establish and evaluate information security programs
d) To analyze network traffic performance

View Answers


Question 2. Consider the following statements
a. The first dimension of the McCumber cube identifies the goals to protect the cyber world.
b. The second dimension of the McCumber cube focuses on the problems of protecting all of the states of data in the cyber world.
c. The third dimension of the McCumber cube defines the types of controls used to protect the cyber world.
Which of the above statements are True?

a) Only a is true
b) a and b are true
c) b and c are true
d) a, b, and c are true

View Answers


Question 3. In a malware detection system, when legitimate business software is incorrectly identified as malicious, this represents:
a) True Positive (TP)
b) False Positive (FP)
c) True Negative (TN)
d) False Negative (FN)

View Answers


Question 4. True or False: A False Negative in malware detection means the system correctly identifies a safe file as non-malicious.
a) True
b) False

View Answers


Question 5. A vulnerability in cybersecurity is best defined as:
a) A malicious program designed to damage systems
b) A security patch released by software vendors
c) A method used by attackers to gain unauthorized access
d) A weakness or flaw in technology, processes, or human behavior that leaves systems open to exploitation

View Answers


Question 6. An exploit is primarily:
a) A weakness in system security that needs patching
b) A technique used to compromise a system
c) A novel self-protecting antivirus software
d) A security framework for risk assessment

View Answers


Question 7. True or False: Accuracy is an attribute of information that describes how data is genuine or original rather than reproduced or fabricated.
a) True
b) False

View Answers


Question 8. What is a recommended defense against phishing emails?
a) Always open attachments to check content
b) Click links only if the sender is familiar
c) Verify the source and avoid clicking suspicious links
d) Forward the email to colleagues

View Answers


Question 9. Which of the following are best practices for balancing information security and access? (Select all that apply. More than one answer may be possible)
a) Regular review of user access rights
b) Implementing role-based access control
c) Granting blanket access to all employees
d) Monitoring and auditing access logs

View Answers


Question 10. In an information system, which component is responsible for enabling communication and data transfer between devices?
a) Hardware
b) Software
c) Networks
d) Data

View Answers


Cyber Security and Privacy Week 2 Nptel Answers (July-Dec 2024)

Session: JUL-DEC 2024


Q1.CIA triad refers to:
Confidentiality, Integrity and Availability
Confidentiality, Integrity and Authentication
Confidentiality, Integrity and Authorization
Cybersecurity, Investigation and Authentication

Answer: Confidentiality, Integrity and Availability


Q2.What aspect emerges from the intersection of 3 components of Information Security?
Technology
Policy
Human Security
None of the above

Answer: Policy


For answers or latest updates join our telegram channel: Click here to join

These are Cyber Security and Privacy Week 2 Nptel 2024 Answers


Q3. ————-, authentication and authorization are means to ensure CIA.
Investigation
Identification
Classification
Verification

Answer: Identification


Q4.Should all 27 cells of McCumber’s Cube be addressed with the same priority?
True
False

Answer: False


For answers or latest updates join our telegram channel: Click here to join

These are Cyber Security and Privacy Week 2 Nptel 2024 Answers


Q5.Which of the following is/ are the design principles of high availability systems?
Eliminate single points of failure
Ensure reliable crossover
Identify failures in real time
All the above

Answer: All the above


Q6. In ensuring confidentiality, what is the crucial process that involves classifying information and individuals, and mapping them based on the level of access?
Identification
Authentication
Authorization
Encryption

Answer: Identification


For answers or latest updates join our telegram channel: Click here to join

These are Cyber Security and Privacy Week 2 Nptel Answers


Q7.In addition to cryptography, a number of measures may be used for confidentiality, including:
Information classification
Secure document storage
Application of general security policies
All the above

Answer: All the above


Q8. When a control provides assurance that every activity undertaken can be attributed to a named person or automated process, it is known as:
Integrity
Accountability
Accessibility
Authenticity

Answer: Accountability


For answers or latest updates join our telegram channel: Click here to join

These are Cyber Security and Privacy Week 2 Nptel Answers


Q9. Identify the components of Information Security
Network Security
Computer & Data Security
Management of Information Security
All of the above

Answer: All of the above


Q10. Which are the three types of power McCumber’s Cube identifies?
Technologies
Policies and Practices
People
All the above

Answer: All the above


For answers or latest updates join our telegram channel: Click here to join

These are Cyber Security and Privacy Week 2 Nptel Answers

All Weeks of Cyber Security and Privacy: Click here

For answers to additional Nptel courses, please refer to this link: NPTEL Assignment Answers

These are Cyber Security and Privacy Week 2 Nptel Assignment Answers