Cyber Security and Privacy Week 2 Nptel Answers
Are you looking for Cyber Security and Privacy Week 2 Nptel Answers ? You’ve come to the right place! Access the most accurate answers at Progiez.
Table of Contents

Cyber Security and Privacy Week 2 Nptel Answers (July-Dec 2025)
Question 1. What is the primary purpose of the McCumber Cube?
a) To develop network security protocols
b) To create operating systems
c) To establish and evaluate information security programs
d) To analyze network traffic performance
Question 2. Consider the following statements
a. The first dimension of the McCumber cube identifies the goals to protect the cyber world.
b. The second dimension of the McCumber cube focuses on the problems of protecting all of the states of data in the cyber world.
c. The third dimension of the McCumber cube defines the types of controls used to protect the cyber world.
Which of the above statements are True?
a) Only a is true
b) a and b are true
c) b and c are true
d) a, b, and c are true
Question 3. In a malware detection system, when legitimate business software is incorrectly identified as malicious, this represents:
a) True Positive (TP)
b) False Positive (FP)
c) True Negative (TN)
d) False Negative (FN)
Question 4. True or False: A False Negative in malware detection means the system correctly identifies a safe file as non-malicious.
a) True
b) False
Question 5. A vulnerability in cybersecurity is best defined as:
a) A malicious program designed to damage systems
b) A security patch released by software vendors
c) A method used by attackers to gain unauthorized access
d) A weakness or flaw in technology, processes, or human behavior that leaves systems open to exploitation
Question 6. An exploit is primarily:
a) A weakness in system security that needs patching
b) A technique used to compromise a system
c) A novel self-protecting antivirus software
d) A security framework for risk assessment
Question 7. True or False: Accuracy is an attribute of information that describes how data is genuine or original rather than reproduced or fabricated.
a) True
b) False
Question 8. What is a recommended defense against phishing emails?
a) Always open attachments to check content
b) Click links only if the sender is familiar
c) Verify the source and avoid clicking suspicious links
d) Forward the email to colleagues
Question 9. Which of the following are best practices for balancing information security and access? (Select all that apply. More than one answer may be possible)
a) Regular review of user access rights
b) Implementing role-based access control
c) Granting blanket access to all employees
d) Monitoring and auditing access logs
Question 10. In an information system, which component is responsible for enabling communication and data transfer between devices?
a) Hardware
b) Software
c) Networks
d) Data
Cyber Security and Privacy Week 2 Nptel Answers (July-Dec 2024)
Session: JUL-DEC 2024
Q1.CIA triad refers to:
Confidentiality, Integrity and Availability
Confidentiality, Integrity and Authentication
Confidentiality, Integrity and Authorization
Cybersecurity, Investigation and Authentication
Answer: Confidentiality, Integrity and Availability
Q2.What aspect emerges from the intersection of 3 components of Information Security?
Technology
Policy
Human Security
None of the above
Answer: Policy
For answers or latest updates join our telegram channel: Click here to join
These are Cyber Security and Privacy Week 2 Nptel 2024 Answers
Q3. ————-, authentication and authorization are means to ensure CIA.
Investigation
Identification
Classification
Verification
Answer: Identification
Q4.Should all 27 cells of McCumber’s Cube be addressed with the same priority?
True
False
Answer: False
For answers or latest updates join our telegram channel: Click here to join
These are Cyber Security and Privacy Week 2 Nptel 2024 Answers
Q5.Which of the following is/ are the design principles of high availability systems?
Eliminate single points of failure
Ensure reliable crossover
Identify failures in real time
All the above
Answer: All the above
Q6. In ensuring confidentiality, what is the crucial process that involves classifying information and individuals, and mapping them based on the level of access?
Identification
Authentication
Authorization
Encryption
Answer: Identification
For answers or latest updates join our telegram channel: Click here to join
These are Cyber Security and Privacy Week 2 Nptel Answers
Q7.In addition to cryptography, a number of measures may be used for confidentiality, including:
Information classification
Secure document storage
Application of general security policies
All the above
Answer: All the above
Q8. When a control provides assurance that every activity undertaken can be attributed to a named person or automated process, it is known as:
Integrity
Accountability
Accessibility
Authenticity
Answer: Accountability
For answers or latest updates join our telegram channel: Click here to join
These are Cyber Security and Privacy Week 2 Nptel Answers
Q9. Identify the components of Information Security
Network Security
Computer & Data Security
Management of Information Security
All of the above
Answer: All of the above
Q10. Which are the three types of power McCumber’s Cube identifies?
Technologies
Policies and Practices
People
All the above
Answer: All the above
For answers or latest updates join our telegram channel: Click here to join
These are Cyber Security and Privacy Week 2 Nptel Answers
All Weeks of Cyber Security and Privacy: Click here
For answers to additional Nptel courses, please refer to this link: NPTEL Assignment Answers
