Practical Cyber Security for Cyber Security Practitioners Nptel Week 5 Answers
Are you looking for Nptel Week 5 Answers Practical Cyber Security for Cyber Security Practitioners ? All weeks solutions of this Swayam course are available here.
Table of Contents

Nptel Week 5 Answers Practical Cyber Security for Cyber Security Practitioners (July-Dec 2025)
Course link: Click here to visit course on Nptel Website
Question 1. How can attackers achieve intermediate goals in a network using the Unified Kill Chain?
a) By combining multiple phases strategically to gain a foothold, propagate, and act on critical assets.
b) By focusing on a single phase without considering the overall progression.
c) By sequentially using disconnected tactics with no regard for the final objective.
d) By relying solely on external attacks without targeting the internal network.
Question 2. How does the Unified Kill Chain enhance the effectiveness of Red Team threat emulations?
a) By providing a clear, time-bound sequence of attack phases to follow
b) By focusing only on the initial phases of an attack.
c) By limiting the scope of threat emulations to simple attacks.
d) By improving the predictive value through structured analysis of likely attack paths
Question 3. What is a key consideration for defensive strategies according to the Unified Kill Chain model?
a) Prioritizing defenses against external attacks while ignoring internal network security
b) Creating choke points in the network to force attackers to restart their attack path
c) Securing every single internet-connected device with equal priority.
d) Assuming that attackers will follow a predictable, linear sequence of attack phases
Question 4. Why might focusing on defending a limited number of critical assets be more effective than protecting all internet-connected systems?
a) Because critical assets are less likely to be targeted by attackers.
b) Because critical assets are typically within the defender’s control and are essential to the attacker’s objectives.
c) Because the compromise of every system is easy to prevent.
d) Because attackers generally avoid targeting critical assets in favor of more accessible targets.
These are Nptel Week 5 Answers Practical Cyber Security for Cyber Security Practitioners
Question 5. What challenge does the Unified Kill Chain suggest exists for defenders when dealing with advanced attacks?
a) Attackers are unlikely to bypass any phases of the kill chain
b) Advanced attacks always follow a strict sequence, making them predictable.
c) The kill chain guarantees that defenders will succeed if they disrupt any single phase.
d) Attackers can bypass, repeat, or rearrange attack phases, complicating defensive strategies.
Question 6. Which of the following approaches is likely to enhance the success of defensive strategies against cyber attacks?
a) Implementing layered defense strategies that focus on high-frequency attack phases
b) Focusing exclusively on preventing attacks at their earliest stage
c) Relying solely on perimeter defenses to stop attackers.
d) Assuming that attackers will be deterred after failing at one attack phase
Question 7. Which of the following is a reason for the development of the Unified Kill Chain over the traditional Cyber Kill Chain (CKC)?
a) The traditional CKC fully covers all attack vectors, including those behind the organizational perimeter.
b) The traditional CKC is focused only on endpoint security, ignoring network-based attacks
c) The MITRE ATT&CK model fully captures the progression of an attack, making the CKC redundant.
d) The Unified Kill Chain was developed because the traditional CKC is perimeter- and malware-focused, missing other attack vectors.
These are Nptel Week 5 Answers Practical Cyber Security for Cyber Security Practitioners
Question 8. Why might a purely deterministic sequence of attack phases in the CKC model be insufficient for modern cybersecurity defense?
a) Because attackers always follow a predictable path.
b) Because attackers can bypass certain phases, making the sequence less relevant.
c) Because the CKC model is perfect and doesn’t need any adjustments.
d) Because focusing on early stages of attacks is always enough to prevent breaches.
Question 9. How does the Unified Kill Chain improve upon traditional kill chain models in terms of cybersecurity investments?
a) By focusing investments exclusively on endpoint security
b) By ignoring the need for threat intelligence and focusing only on real-time attacks.
c) By simplifying the defense strategy to focus on the most basic threats
d) By offering a structured basis to realign investments across prevention, detection, response, and intelligence.
Question 10. What is the primary advantage of using the Unified Kill Chain in emergency response situations?
a) It eliminates the need for triage in incident response.
b) It aids investigators in triage and models likely attack paths for more effective responses.
c) It guarantees that all attacks will be detected before they occur.
d) It focuses solely on external attacks, ignoring internal network breaches.
These are Nptel Week 5 Answers Practical Cyber Security for Cyber Security Practitioners