Cyber security and privacy | NPTEL | Week 7 Answers

This set of MCQ(multiple choice questions) focuses on the Cyber Security and Privacy NPTEL Week 7 Answers

You should practice these questions to improve fundamentals of Cyber security needed for various interviews (like company interview, campus interview, walk-in interview), entrance exams, placements and other competitive exams. All the questions in this particular section are based on only “Cyber Security and Privacy NPTEL Week 7 Answers“.

Course layout

Week 1: Assignment solutions
Week 2:
Assignment solutions
Week 3:
Assignment solutions
Week 4:
Assignment solutions

Week 5: Assignment Solutions
Week 6: Assignment solutions
Week 7: Assignment solutions
Week 8: Assignment solutions
Week 9: Assignment solutions
Week 10: Assignment solutions
Week 11: Assignment solutions
Week 12: Assignment solutions

NOTE: You can check your answer immediately by clicking show answer button. Moreover, this set of “Cyber Security and Privacy NPTEL Week 7 Answers” contains 10 questions.

Now, start attempting the quiz.

Cyber Security and Privacy NPTEL Week 7 Answers

Q1. Which VPN technology uses leased circuits from a service provider and conducts packet switching over these leased circuits?

a) Secure VPN
b) Hybrid VPN
c) Trusted VPN
d) Transport VPN

Answer: c) Trusted VPN

Cyber Security and Privacy NPTEL Week 7 Answers

Q2. The biometric technology criteria that describe the number of legitimate users who are denied access because of a failure in the biometric device is known as

a) False reject rate
b) False accept rate
c) Crossover error rate
d) Accountability rate

Answer: a) False reject rate

Q3. True or False: All traffic exiting from the trusted network should be filtered.

a) True
b) False

Answer: b) False

Q4. What term is used to describe decoy systems designed to lure potential attackers away from critical systems?

a) Trap
b) Honeypot
c) Trace
d) Sniffer

Answer: b) Honeypot

Cyber Security and Privacy NPTEL Week 7 Answers

Q5. True or False: Signature-based IDPS technology is widely used because many attacks have clear and distinct signatures.

a) True
b) False

Answer: a) True

Q6. The method by which systems determine whether and how to admit a user into a trusted area of the organization is known as

a) Attribute
b) Accountability
c) Access control
d) Audibility

Answer: c) Access control

Q7. ______________ denotes the rate at which fraudulent users or nonusers are allowed access to systems or areas as a result of a failure in the biometric device. This failure is also known as _______________.

a) False reject rate, Type 1 error
b) False accept rate, Type 2 error
c) False accept rate, Type 1 error
d) False reject rate, Type 2 error

Answer: b) False accept rate, Type 2 error

Cyber Security and Privacy NPTEL Week 7 Answers

Q8. Fill in the blank
______________ denotes the rate at which authorised users are denied access to systems or areas as a result of a failure in the biometric device. This failure is also known as _____________.
Choose the correct option.

a) False reject rate, Type 1 error
b) False accept rate, Type 2 error
c) False accept rate, Type 1 error
d) False reject rate, Type 2 error

Answer: a) False reject rate, Type 1 error

Q9. Match the following

a) A-2, B-3, C-1, D-4
b) A-2, B-1, C-3, D-4
c) A-1, B-2, C-3, D-4
d) A-2, B-1, C-4, D-3

Answer: d) A-2, B-1, C-4, D-3

Q10. Choose the right option to fill in the blanks.
(1) ___________ initiates network traffic to find and evaluate service ports whereas (2) ___________ uses traffic from the target network segment to evaluate the service ports available from hosts on that segment.

a) 1-active vulnerability scanners, 2-passive vulnerability scanners
b) 1-passive vulnerability scanners, 2-active vulnerability scanners

Answer: a) 1-active vulnerability scanners, 2-passive vulnerability scanners

Cyber Security and Privacy NPTEL Week 7 Answers

<< Prev- Cyber Security and Privacy Week 6 Assignment Solutions

>> Next- Cyber Security and Privacy Week 8 Assignment Solutions

DISCLAIMER: Use these answers only for the reference purpose. Quizermania doesn't claim these answers to be 100% correct. So, make sure you submit your assignments on the basis of your knowledge.

Programming in Java NPTEL week 1 quiz answers

Nptel – Deep Learning assignment solutions

For discussion about any question, join the below comment section. And get the solution of your query. Also, try to share your thoughts about the topics covered in this particular quiz.

Leave a Comment

Your email address will not be published. Required fields are marked *