Practical Cyber Security for Cyber Security Practitioners Nptel Week 2 Answers
Are you looking for Nptel Week 2 Answers Practical Cyber Security for Cyber Security Practitioners ? All weeks solutions of this Swayam course are available here.
Nptel Week 2 Answers Practical Cyber Security for Cyber Security Practitioners (July-Dec 2025)
Course link: Click here to visit course on Nptel Website
Question 1. What is the best measure of how effective our cybersecurity infrastructure is?
a) Compliance
b) Robustness
c) Resilience
d) Patch
e) Update
Question 2. Which of the following best describes a zero-click attack?
a) An attack that uses brute force to crack passwords
b) An attack that exploits vulnerabilities in a system without any user interaction
c) An attack that targets the network infrastructure directly
d) An attack that involves clicking zeros as response
e) An attack that requires user interaction, such as clicking on a link or opening an attachment
Question 3. Command and Control (C2) is NOT used for which of the following activities by the adversary?
a) Privilege escalation
b) Knowing if the intended malware is installed on the target
c) Sending commands to the compromised system
d) Data exfiltration
e) Disabling security systems
Question 4. Which method is ranked highest for knowing if your internet-facing systems are being scanned?
a) Network Monitoring
b) Application Logs
c) User Activity Logs
d) Web Server Logs
e) Windows Event Viewer
Question 5. In the MITRE ATT&CK framework, what is the relationship between tactics and techniques?
a) Techniques are the overarching goals, while tactics are the steps to achieve those goals
b) Techniques are the strategic objectives, and tactics are the tools used to accomplish them
c) Tactics are the overall goals of an adversary, while techniques are the specific methods used to achieve those goals
d) Tactics and techniques are interchangeable terms for adversary actions
e) Tactics are specific methods used to achieve techniques
Question 6. What type of delivery mechanism is most commonly used in the ‘Delivery’ stage of the Cyber Kill Chain?
a) Denial of service attacks
b) SQL injection
c) Man-in-the-middle attacks
d) Zero-day exploits
e) Phishing
Question 7. Which of the following is a method used to deceive attackers during the ‘Actions on Objectives’ stage in the Cyber Kill Chain?
a) Firewall ACL
b) Patch
c) Honeypot
d) NIDS
e) In-line AV
Question 8. What is the most relevant order of importance for IT system security?
a) Availability, Confidentiality, Integrity
b) Availability, Integrity, Confidentiality
c) Confidentiality, Integrity, Availability
d) Confidentiality, Availability, Integrity
e) Integrity, Confidentiality, Availability
Question 9. What is the most reliable way to identify if someone from suspicious IP addresses is visiting your website?
a) Application Logs
b) Intrusion Detection Systems (IDS)
c) Network Monitoring
d) Windows Event Viewer
e) Web Server Logs
Question 10. During the ‘Installation’ stage of the Cyber Kill Chain, the attacker typically aims to:
a) Deploy additional tools for further attacks
b) Bypass security defenses of the target
c) Steal user credentials from the target
d) Establish persistence on the target’s system
e) Initiate data exfiltration processes
These are Nptel Week 2 Answers Practical Cyber Security for Cyber Security Practitioners