NPTEL Cyber Security and Privacy Week 7 Assignment Answers 2024

Sanket
By Sanket

NPTEL Cyber Security and Privacy Week 7 Assignment Answers 2024

1. _________ is a comprehensive system comprising software, encryption techniques, protocols, legal arrangements, and third-party services that facilitate secure communication among users by utilizing digital certificates.

  • Registration authority
  • Public key infrastructure
  • Digital signature
  • Certificate authority
Answer :- For Answers Click Here 

2. Which ring does the kernel, the core of the operating system, typically operate?

  • Ring 2
  • Ring 1
  • Ring 0
  • Ring 3
Answer :- For Answers Click Here 

3. hich of the following statements is not true?

  • Hash functions are one-way.
  • It is possible to attach a message authentication code (MAC) to allow only specific recipients to access the message digest.
  • Hashing functions require the use of keys.
  • Hash functions are used in password verification systems to confirm the identity of the user.
Answer :- For Answers Click Here 

4. Which of the following is not related to defense against rainbow cracking?

  • Password hash salting
  • key stretching
  • Key strengthening
  • Private key encryption
Answer :- 

5. Which of the following statements is/are correct?

  • TCP is a connection-oriented protocol, while UDP is connectionless.
  • TCP is comparatively faster than UDP.
  • TCP provides reliable data delivery, while UDP does not.
  • Both a and c.
Answer :- 

6. WhichWhich of the following statements about Virtual Private Networks (VPN) are true? of the following statements is/are correct?

  • A VPN is an encrypted connection over the Internet from a device to a network.
  • A VPN keeps the contents of the network messages hidden from observers who may have access to public traffic.
  • A VPN protects its users by masking their IP address.
  • All the above.
Answer :- For Answers Click Here 

7. Endpoint Detection and Response (EDR) solutions are primarily focused on:

  • Securing network perimeters and firewalls.
  • Protecting individual user devices from threats.
  • Monitoring and analyzing network traffic for malicious activity.
  • Providing vulnerability assessments for servers and applications.
Answer :- 

8. Cryptojacking is a cyber attack that leverages a victim’s computer resources for the attacker’s financial gain. Which of the following best describes the attacker’s activity in a cryptojacking attack?

  • Encrypting the victim’s data and demanding a ransom payment.
  • Gaining unauthorized access to the victim’s personal information for resale.
  • Silently using the victim’s processing power to solve complex mathematical problems for financial reward.
  • Disrupting the normal operation of the victim’s system to cause inconvenience.
Answer :- 

9. What kind of infrastructure Advanced Persistent Threat (APT) groups are typically known for targeting?

  • Personal computers of home users.
  • Critical infrastructure essential for national security (e.g., power grids, communication networks).
  • Public Wi-Fi networks at cafes or airports.
  • Outdated operating systems on personal devices of insignificant value
Answer :- 

10. Which of the following is NOT one of the stages in the Intrusion Kill Chain framework?

  • Reconnaissance
  • Exploitation
  • Cleanup
  • Command and Control
Answer :- For Answers Click Here 
Share This Article
Leave a comment