NPTEL Cyber Security and Privacy Week 7 Assignment Answers 2024
1. _________ is a comprehensive system comprising software, encryption techniques, protocols, legal arrangements, and third-party services that facilitate secure communication among users by utilizing digital certificates.
- Registration authority
- Public key infrastructure
- Digital signature
- Certificate authority
Answer :- For Answers Click Here
2. Which ring does the kernel, the core of the operating system, typically operate?
- Ring 2
- Ring 1
- Ring 0
- Ring 3
Answer :- For Answers Click Here
3. hich of the following statements is not true?
- Hash functions are one-way.
- It is possible to attach a message authentication code (MAC) to allow only specific recipients to access the message digest.
- Hashing functions require the use of keys.
- Hash functions are used in password verification systems to confirm the identity of the user.
Answer :- For Answers Click Here
4. Which of the following is not related to defense against rainbow cracking?
- Password hash salting
- key stretching
- Key strengthening
- Private key encryption
Answer :-
5. Which of the following statements is/are correct?
- TCP is a connection-oriented protocol, while UDP is connectionless.
- TCP is comparatively faster than UDP.
- TCP provides reliable data delivery, while UDP does not.
- Both a and c.
Answer :-
6. WhichWhich of the following statements about Virtual Private Networks (VPN) are true? of the following statements is/are correct?
- A VPN is an encrypted connection over the Internet from a device to a network.
- A VPN keeps the contents of the network messages hidden from observers who may have access to public traffic.
- A VPN protects its users by masking their IP address.
- All the above.
Answer :- For Answers Click Here
7. Endpoint Detection and Response (EDR) solutions are primarily focused on:
- Securing network perimeters and firewalls.
- Protecting individual user devices from threats.
- Monitoring and analyzing network traffic for malicious activity.
- Providing vulnerability assessments for servers and applications.
Answer :-
8. Cryptojacking is a cyber attack that leverages a victim’s computer resources for the attacker’s financial gain. Which of the following best describes the attacker’s activity in a cryptojacking attack?
- Encrypting the victim’s data and demanding a ransom payment.
- Gaining unauthorized access to the victim’s personal information for resale.
- Silently using the victim’s processing power to solve complex mathematical problems for financial reward.
- Disrupting the normal operation of the victim’s system to cause inconvenience.
Answer :-
9. What kind of infrastructure Advanced Persistent Threat (APT) groups are typically known for targeting?
- Personal computers of home users.
- Critical infrastructure essential for national security (e.g., power grids, communication networks).
- Public Wi-Fi networks at cafes or airports.
- Outdated operating systems on personal devices of insignificant value
Answer :-
10. Which of the following is NOT one of the stages in the Intrusion Kill Chain framework?
- Reconnaissance
- Exploitation
- Cleanup
- Command and Control
Answer :- For Answers Click Here