This set of MCQ(multiple choice questions) focuses on the Cyber Security and Privacy NPTEL Week 7 Answers
You should practice these questions to improve fundamentals of Cyber security needed for various interviews (like company interview, campus interview, walk-in interview), entrance exams, placements and other competitive exams. All the questions in this particular section are based on only “Cyber Security and Privacy NPTEL Week 7 Answers“.
Course layout
Week 1: Assignment solutions
Week 2: Assignment solutions
Week 3: Assignment solutions
Week 4: Assignment solutions
Week 5: Assignment Solutions
Week 6: Assignment solutions
Week 7: Assignment solutions
Week 8: Assignment solutions
Week 9: Assignment solutions
Week 10: Assignment solutions
Week 11: Assignment solutions
Week 12: Assignment solutions
NOTE: You can check your answer immediately by clicking show answer button. Moreover, this set of “Cyber Security and Privacy NPTEL Week 7 Answers” contains 10 questions.
Now, start attempting the quiz.
Cyber Security and Privacy NPTEL Week 7 Answers
Q1. Which VPN technology uses leased circuits from a service provider and conducts packet switching over these leased circuits?
a) Secure VPN
b) Hybrid VPN
c) Trusted VPN
d) Transport VPN
Answer: c) Trusted VPN
Q2. The biometric technology criteria that describe the number of legitimate users who are denied access because of a failure in the biometric device is known as
a) False reject rate
b) False accept rate
c) Crossover error rate
d) Accountability rate
Answer: a) False reject rate
Q3. True or False: All traffic exiting from the trusted network should be filtered.
a) True
b) False
Answer: b) False
Q4. What term is used to describe decoy systems designed to lure potential attackers away from critical systems?
a) Trap
b) Honeypot
c) Trace
d) Sniffer
Answer: b) Honeypot
Q5. True or False: Signature-based IDPS technology is widely used because many attacks have clear and distinct signatures.
a) True
b) False
Answer: a) True
Q6. The method by which systems determine whether and how to admit a user into a trusted area of the organization is known as
a) Attribute
b) Accountability
c) Access control
d) Audibility
Answer: c) Access control
Q7. ______________ denotes the rate at which fraudulent users or nonusers are allowed access to systems or areas as a result of a failure in the biometric device. This failure is also known as _______________.
a) False reject rate, Type 1 error
b) False accept rate, Type 2 error
c) False accept rate, Type 1 error
d) False reject rate, Type 2 error
Answer: b) False accept rate, Type 2 error
Q8. Fill in the blank
______________ denotes the rate at which authorised users are denied access to systems or areas as a result of a failure in the biometric device. This failure is also known as _____________.
Choose the correct option.
a) False reject rate, Type 1 error
b) False accept rate, Type 2 error
c) False accept rate, Type 1 error
d) False reject rate, Type 2 error
Answer: a) False reject rate, Type 1 error
Q9. Match the following
a) A-2, B-3, C-1, D-4
b) A-2, B-1, C-3, D-4
c) A-1, B-2, C-3, D-4
d) A-2, B-1, C-4, D-3
Answer: d) A-2, B-1, C-4, D-3
Q10. Choose the right option to fill in the blanks.
(1) ___________ initiates network traffic to find and evaluate service ports whereas (2) ___________ uses traffic from the target network segment to evaluate the service ports available from hosts on that segment.
a) 1-active vulnerability scanners, 2-passive vulnerability scanners
b) 1-passive vulnerability scanners, 2-active vulnerability scanners
Answer: a) 1-active vulnerability scanners, 2-passive vulnerability scanners
<< Prev- Cyber Security and Privacy Week 6 Assignment Solutions
>> Next- Cyber Security and Privacy Week 8 Assignment Solutions
DISCLAIMER: Use these answers only for the reference purpose. Quizermania doesn't claim these answers to be 100% correct. So, make sure you submit your assignments on the basis of your knowledge.
Programming in Java NPTEL week 1 quiz answers
Nptel – Deep Learning assignment solutions
For discussion about any question, join the below comment section. And get the solution of your query. Also, try to share your thoughts about the topics covered in this particular quiz.