Cyber Security and Privacy Week 7 Nptel Answers 2024

Are you looking for Cyber Security and Privacy Week 7 Nptel Answers? You’ve come to the right place! Access the latest and most accurate solutions for your Week 7 assignment in the Cyber Security and Privacy course.

Course Link: Click Here


Correct Cyber Security and Privacy Week 7 Nptel Answers 2024 image
Cyber Security and Privacy Week 7 Nptel Answers

Cyber Security and Privacy Week 7 Nptel Answers (July-Dec 2024)


  1. __ is a comprehensive system comprising software, encryption techniques, protocols, legal arrangements, and third-party services that facilitate secure communication among users by utilizing digital certificates.
    A) Registration authority
    B) Public key infrastructure
    C) Digital signature
    D) Certificate authority

Answer: B) Public key infrastructure


  1. Which ring does the kernel, the core of the operating system, typically operate?
    A) Ring 2
    B) Ring 1
    C) Ring 0
    D) Ring 3

Answer: C) Ring 0


  1. Which of the following statements is not true?
    A) Hash functions are one-way.
    B) It is possible to attach a message authentication code (MAC) to allow only specific recipients to access the message digest.
    C) Hashing functions require the use of keys.
    D) Hash functions are used in password verification systems to confirm the identity of the user.

Answer: C) Hashing functions require the use of keys.


  1. Which of the following is not related to defense against rainbow cracking?
    A) Password hash salting
    B) Key stretching
    C) Key strengthening
    D) Private key encryption

Answer: D) Private key encryption


  1. Which of the following statements is/are correct?
    A) TCP is a connection-oriented protocol, while UDP is connectionless.
    B) TCP is comparatively faster than UDP.
    C) TCP provides reliable data delivery, while UDP does not.
    D) Both a and c.
See also  All About NPTEL

Answer: D) Both a and c.


  1. Which of the following statements about Virtual Private Networks (VPN) are true?
    A) A VPN is an encrypted connection over the Internet from a device to a network.
    B) A VPN keeps the contents of the network messages hidden from observers who may have access to public traffic.
    C) A VPN protects its users by masking their IP address.
    D) All the above.

Answer: D) All the above.rogress


  1. Endpoint Detection and Response (EDR) solutions are primarily focused on:
    A) Securing network perimeters and firewalls.
    B) Protecting individual user devices from threats.
    C) Monitoring and analyzing network traffic for malicious activity.
    D) Providing vulnerability assessments for servers and applications.

Answer: B) Protecting individual user devices from threats.


  1. Cryptojacking is a cyber attack that leverages a victim’s computer resources for the attacker’s financial gain. Which of the following best describes the attacker’s activity in a cryptojacking attack?
    A) Encrypting the victim’s data and demanding a ransom payment.
    B) Gaining unauthorized access to the victim’s personal information for resale.
    C) Silently using the victim’s processing power to solve complex mathematical problems for financial reward.
    D) Disrupting the normal operation of the victim’s system to cause inconvenience.

Answer: C) Silently using the victim’s processing power to solve complex mathematical problems for financial reward.


  1. What kind of infrastructure Advanced Persistent Threat (APT) groups are typically known for targeting?
    A) Personal computers of home users.
    B) Critical infrastructure essential for national security (e.g., power grids, communication networks).
    C) Public Wi-Fi networks at cafes or airports.
    D) Outdated operating systems on personal devices of insignificant value
See also  Cyber Security and Privacy | Week 10

Answer: B) Critical infrastructure essential for national security (e.g., power grids, communication networks).


  1. Which of the following is NOT one of the stages in the Intrusion Kill Chain framework?
    A) Reconnaissance
    B) Exploitation
    C) Cleanup
    D) Command and Control

Answer: C) Cleanup


These are Cyber Security and Privacy Week 7 Nptel Answers

All Weeks of Cyber Security and Privacy: Click here

For answers to additional Nptel courses, please refer to this link: NPTEL Assignment


Cyber Security and Privacy Week 7 Nptel Answers (July-Dec 2023)

Course Name: Cyber Security and Privacy

Course Link: Click Here

These are Cyber Security and Privacy Nptel Assignment 7 Answers


Q1. Which VPN technology uses leased circuits from a service provider and conducts packet switching over these leased circuits?
Secure VPN
Hybrid VPN
Trusted VPN
Transport VPN

Answer: Trusted VPN


Q2. The biometric technology criteria that describe the number of legitimate users who are denied access because of a failure in the biometric device in known as
False reject rate
False accept rate
Crossover error rate
Accountability rate

Answer: False reject rate


Q3. True or False: All traffic exiting from the trusted network should be filtered.
True
False

Answer: False


Q4. What term is used to describe decoy systems designed to lure potential attackers away from critical systems?
Trap
Honeypot
Trace
Sniffer

Answer: Honeypot


Q5. True or False: Signature-based IDPS technology is widely used because many attacks have clear and distinct signatures.
True
False

Answer: True


Q6. The method by which systems determine whether and how to admit a user into a trusted area of the organization is known as
Attribute
Accountability
Access control
Audibility

Answer: Access control

See also  Cyber Security and Privacy | Week 1

These are Cyber Security and Privacy Nptel Assignment 7 Answers


Q7. ——————denotes the rate at which fraudulent users or nonusers are allowed access to systems or areas as a result of a failure in the biometric device. This failure is also known as ————–
False reject rate, Type I error
False accept rate, Type 2 error
False accept rate, Type I error
False reject rate, Type 2 error

Answer: False accept rate, Type 2 error


These are Cyber Security and Privacy Nptel Assignment 7 Answers


Q8. Fill in the blank
——————denotes the rate at which authorised users are denied access to systems or areas as a result of a failure in the biometric device. This failure is also known as ————.
Choose the correct option

False reject rate, Type I error
False accept rate, Type 2 error
False accept rate, Type I error
False reject rate, Type 2 error

Answer: False reject rate, Type I error


Q9. Match the following
A. Thresholds 1 Signature-based detection
B. Blacklists and whitelists: 2 Anomaly-based detection
C. Alert settings: 3 Detection-related related programs
D. Code viewing and editing: 4 Specifying which prevention capabilities
Choose the correct option

A-2, B-3, C-1, D-4
A-2, B-1, C-3, D-4
A-1, B-2, C-3, D-4
A-2, B-1, C-4, D-3

Answer: A-2, B-1, C-4, D-3


These are Cyber Security and Privacy Nptel Assignment 7 Answers


Q10. Choose the right option to fill in the blanks
(1) ————— initiates network traffic to find and evaluate service ports whereas (2) —————- uses traffic from the target network segment to evaluate the service ports available from hosts on that segment.

1-active vulnerability scanners, 2-passive vulnerability scanners
1-passive vulnerability scanners, 2-active vulnerability scanners

Answer: 1-active vulnerability scanners, 2-passive vulnerability scanners