NPTEL CYBER SECURITY ASSIGNMENT 2021

nptel cyber security assignment

NPTEL CYBER SECURITY The course on Cyber Security is very important in this digital era due to dependency on online operations, social media practices, upcoming technologies like IoT, IIoT, IoE, digitization and the pervasive nature of mobile devices. Secure online operations and safe handling of devices are the need of the hour.

NPTEL CYBER SECURITY is a MOOC course offered by Avinashilingam Institute for Home Science & Higher Education for Women,Coimbatore on the NPTEL platform. This course helps the students One must understand the security challenges as well as the best practices that are essential to protect one from becoming the victims of cybercrimes.The course is developed By Dr.G.PADMAVATHI is Professor in the Department of Computer Science, Coimbatore since 2007. She has 32 years of teaching experience and 18 years of research experience.

  1. INTENDED AUDIENCE: Any Post Graduate Level Student, Working Professionals and those who are interested in Cyber Security are eligible to attend the course.
  2. Requirements/Prerequisites: Nil
  3. INDUSTRY SUPPORT: Any industry that is involved in the development of AI applications. This not only includes software companies (like Microsoft, Google, and Facebook) but also manufacturing companies like Ford and General Electric, and retail companies like Amazon and Flipkart.

CRITERIA TO GET A CERTIFICATE

Average assignment score = 30% of the average of the best 12 assignments out of the total 15 assignments given in the course.
Exam score = 70% of the proctored certification exam score out of 100

Final score = Average assignment score + Exam score

Students will be eligible for CERTIFICATE ONLY IF AVERAGE ASSIGNMENT SCORE >=10/25 AND EXAM SCORE >= 30/75. If any of the 2 criteria are not met, the student will not get the certificate even if the Final score >= 40/100.

NPTEL CYBER SECURITY ASSIGNMENT WEEK 14 ANSWERS:-

Contents

Q1. Identify the sector that improves the security and flexibility of the National infrastructure and services.

Answer:- b

Q2. Recall the methodology used for updating systems and software through centralized mechanism.

Answer:- a

Q3. Which type of communication replaces paper-based communication methods?

Answer:- c

Q4. Find the third schedule of the amended Information Technology Act.

Answer:- a

Q5. Label the section that deals with the penalty for confidentiality and privacy breaches.

Answer:- d

Q6. Indicate the functions of Indian Computer Emergency Response Team.

Answer:- c

Q7. i.The first schedule of the ITA 2000 widens the scope of the document tenure within electronic documents realm.

Answer:- a

Q8. Match the following: cyber issues with their operations.

Answer:- a

Q9. Arrange the phases of security auditing process.  

Answer:- b

Q10. Statement I: Pull methodology notifies the users for new security patch and insists upon downloading based on their convenience.

Answer:- a

NPTEL CYBER SECURITY ASSIGNMENT WEEK 13 ANSWERS:-

Q1. The information that is kept or communicated in binary form.

Answer:- b

Q2. This place is physically highly secured and prevents the evidence from being destroyed or corrupted.

Answer:- c

Q3. Which phase of digital forensic investigation model involves the paperwork and forms required to document chain of custody?

Answer:- d

Q4. Determine the factor that should be avoided while writing a report in cybercrime investigation.

Answer:- a

Q5. Pick out the procedure used to preserve digital evidence.

Answer:- d

Q6. Multiple Selection Question:

Answer:- a

Q7. i. The primary challenge faced by Law enforcement agencies in gathering evidence is its instability.

Answer:- d

Q8. Match the following:  Analysis techniques involved in acquiring evidence with its functions.

Answer:- c

Q9. Sequence the steps involved in evidence examination process.

Answer:- a

Q10. Statement I: Network miner is a valuable tool that tracks down real-time network intruders.

Answer:- b

NPTEL CYBER SECURITY ASSIGNMENT WEEK 12 ANSWERS:-

Q1. Identify the subdivision of forensic science that emphasizes on refining and examining the evidence from digital devices.

Answer:- c

Q2. Choose the packet analyzer or the network protocol analyzer which is used effectively.

Answer:- d

Q3. Which method is used to record the sequence of custody?

Answer:- b

Q4. This refers to the practice of preventing the process of computer forensic analysis.

Answer:- a

Q5. Detect the type of forensics in which the time, expense and difficulty associated with the evidence collector are high.

Answer:- b

Q6. Select the suitable issues that can be solved by the Budapest Convention on cybercrime functions.

Answer:- d

Q7. i.Digital forensics makes use of only modern forensics methods to find and retrieve evidence.

Answer:- d

Q8. Match the following: Types of digital forensics with its nature.

Answer:- c

Q9. Sequence the process involved in Digital forensics methodology.

Answer:- b

Q10. Statement I: Anti-forensics tools are the popularly used mechanisms in finding evidence.

Answer:- b

NPTEL CYBER SECURITY ASSIGNMENT WEEK 11 ANSWERS:-

Q1. Which uses investigative psychology as its backbone for developing character patterns?

Answer:- b

Q2. Identify the major reason for cybercrime.

Answer:- d

Q3. Find the important step towards developing databases of cybercriminals.

Answer:- b

Q4. This type of profiling tries to build through evidence from the crime scene and integrated into mental theory.

Answer:- d

Q5. An established structure in the society is delivered through this.

Answer:- c

Q6. Multiple Selection Question:List out the crimes excluded in hacking profiler project.A.Cyber bullyingB.Cyber stalkingC.Computer hackingD.E-mail scammingChoose the correct answer from the options given below:

Answer:- a

Q7. Read the statements given below and answer them as TT, TF, FT or FF.(T – True, F – False).i.Insolvency is an example for civil investigation.ii.Modus Operandi is a universal signature pattern of a criminal.

Answer:- a

Q8. Match the following: Behavioral Evidence Analysis with its functions.Behavioral Evidence Analysis Functionsi. Equivocal forensic analysis a. Assesses victim’s traitsii. Victimology         b. Builds outline of criminal profileiii. Assessment of crime scene c. Creates connections to criminal decisionsiv. Criminal characteristics d. Focus on reviewing caseChoose the correct answer from the options given below:

Answer:- d

Q9. Arrange the sequential steps involved in inductive profiling process.  A. Empirical analysisB. TheoryC. Crime Scene dataD. HypothesesChoose the correct answer from the options given below:

Answer:- c

Q10. Statement I: Criminology is the study of nature and influences of criminal behavior.Statement II: The Hacking Profiler Project is involved in investigating hacking incidents.With the above statements, choose the most appropriate answer from the options given below:

Answer:- a

NPTEL CYBER SECURITY ASSIGNMENT WEEK 9 ANSWERS:-

Q1. When was the first cyber offence conducted and recorded?

Answer:- b

Q2. What could be the primary motives behind the Cyber Attacks?

Answer:- d

Q3. Choose the appropriate characteristic that denotes the infringement of fraudulent activity.

Answer:- d

Q4. Who are the Criminals enforcing illegal activities in Cyber Space?

Answer:- a

Q5. This factor has become increasingly harder to recognize as the usage of data has become part of daily routine.

Answer:- b

Q6. Multiple Selection Question:

Answer:c

Q7. Read the statements given below and answer them as TT, TF, FT or FF. (T – True, F – False).

Answer:- b

Q8. Match the following: Cybercrime performed with its effects.

Answer:- c

Q9. 9.Arrange the most widely occurred Cyber Attacks faced by the organizations in a top-down manner. 

Answer:- b

Q10. Given below are two statements.Statement I: Spoofing is typically done by hiding one’s identity or faking the identity of another user.

Answer:- d

NPTEL CYBER SECURITY ASSIGNMENT WEEK 8 ANSWERS:-

Q1. The type of digital currency represented in electronic form.

Answer:- C

Q2. Select a form of Virtual Currency system that resembles central bank in terms of central repository.

Answer:- B

Q3. State the sequence of blocks which contain specific information grouped together in a secure genuine network.

Answer:- D

Q4. Depict the set of rules and arrangements to carry out Blockchain operations.

Answer:- C

Q5. What are the functions covered under Security Audit report?

Answer:- B

Q6. Select the Properties of Virtual Currency.A. UnregulatedB. Regarded as tokensC. Not issued by central banking authorityD. Prone to fluctuationsChoose the correct answer from the options given below:

Answer:- D

Q7. Read the statements given below and answer them as TT, TF, FT or FF. (T – True, F – False).i. Virtual currencies are issued, managed and controlled by public issuers.ii. Exchanging virtual currency usually takes place in two ways.

Answer:- A

Q8. Match the following: Major inventions of Blockchain with their order 

Answer:- C

Q9. Sequence the transaction process in a Public Blockchain system.

Answer:- B

Q10. Given below are two statements.Statement I: Closed virtual currency is also called as non-convertible virtual currency or closed loop currency.Statement II: “Smart Contracts” are reversible.In light of the above statements, choose the most appropriate answer from the options given below:

Answer:- C

NPTEL CYBER SECURITY ASSIGNMENT WEEK 7 ANSWERS:-

Q1. Identify the term that refers the networks of objects, devices or items that are embedded with sensors.

Answers:- c

Q2. State the applications of IoT.

Answer:- d

Q3. Select the cause for forceful shutdown of CPS.

Answer:- a

Q4. How can you name the security between the network and connected devices?

Answer:- a

Q5. Select one of the branches of IoT that is augmented with sensors and actuators.

Answer:- b

Q6. Select the attacks on service layer of SOA.

Answer:- d

Q7. Read the statements given below and answer them as TT, TF, FT or FF.(T – True, F – False).i.Convention is the ability of IoT systems or software to exchange and make use of information.ii.The role of networking layer is to connect all things together.

Answer:- d

Q8. Match the following: Attacks on Service Oriented Architecture (SOA) Layers.

Answer:- c

Q9. Arrange the process of cryptography system.

Answer:- b

Q10.Given below are two statementsStatement I: In Sybil attack, the attacker records packets at one location, channels them to other location and retransmits them into the network.

Answer:- b

NPTEL CYBER SECURITY ASSIGNMENT WEEK 6 ANSWERS:-

Q1. The main focus here is to  protect websites from unauthorized access.

Answer:- c

Q2. Applications that create queries dynamically can be considered as a risk source due to this attack.

Answer:- will be updated soon

Q3. Select the strategy that is followed by the employees for mobile data security.

Answer:- d

Q4. Identify the tool that functions as a gateway between the installed infrastructure and various cloud applications like Dropbox.

Answer:- d

Q5. Which malware looks like trusted attachments or includes hyperlinks that redirects to malicious websites?

Answer:- b

Q6. Select the functions that prevents from the compromise of broken authentication and session management.

Answer:-c

Q7. Read the statements given below and answer them as TT, TF, FT or FF.(T – True, F – False).i.Open Web Security Project is an organization for e-mail security. ii.Network security is same as web application security

Answer:- b

Q8. Match the following: Cloud computing aspects with its properties.

Answer:- c

Q9. Arrange the work flow of Encryption and Decryption process.

Answer:- c

Q10. Given below are two statements.Statement I: Securing an email system is the responsibility of the end user.Statement II:MIME is a free cryptography package that helps people in exchanging messages and provide authentication in email system.From the above statements, choose the most appropriate answer from the options given below:

Answer:- a

NPTEL CYBER SECURITY ASSIGNMENT WEEK 5 ANSWERS:-

Q1. Find the structure that outlines the essential needs to support and implement the security policy.

Answer:- b

quizxp telegram

Q2. Select the model that is intended to avoid conflicts of interest by prohibiting one person from accessing multiple conflict of interest.

Answer:- a

Q3. Mention the type of operations used in transforming plain text to cipher text.

Answer:- c

Q4. Find the process of identifying the path to transfer data over the network.

Answer:- c

Q5. Choose the Widely used security mechanisms to prevent against cyber attacks.

Answer:- d

Q6. Pick the suitable factors of Take-Grant protection model.

Answer:- d

Q7. Read the statements given below and answer them as TT, TF, FT or FF.(T – True, F – False).i.Bell-LaPadula model focuses on maintaining the confidentiality of objects.ii.Non-interference model ensures the knowledge at different security domains that stay connected to each other.

Answer:- c

Q8. Match the following: Attacks with their types.Attacks Typesi.Traffic analysis                              a. Routing attack       ii.Modification b. Passive attackiii.Cookie Poisoning attack c. Application layer attackiv. Hit and Run attack d. Active attackChoose the correct answer from the options given below:

Answer:- d

Q9. Arrange the OSI layers in the top down manner.

Answer:- c

Q10. Given below are two statements.Statement I:Only authorized traffic will be allowed to pass from a firewall.Statement II:Circuit-Level gateway is a firewall proxy.From the above statements, choose the most appropriate answer from the options given below.

Answer:- a

NPTEL CYBER SECURITY ASSIGNMENT WEEK 4 ANSWERS:-

Q1. Choose the proper option from the following that identifies and differentiates a genuine user from an illegitimate user.

Answer:- b

quizxp telegram

Q2. Which authenticates a person based on physical or behavioral characteristics of the claimed person?

Answer:-a

Q3. Select the different types of tokens available in object-based authentication.

Answer:- a

Q4. What is the other name of biometric based authentication?

Answer:- d

Q5. Identify the type of authentication which involves QR validation code.

Answer:- d

Q6. Select the purposes of user authentication system.

Answer:- d

Q7. Read the statements given below and answer them as TT, TF, FT or FF.(T – True, F – False).

Answer:- a

Q8. Match the following: Biometric types with its applications.

Answer:- d

Q9. Sequence the modules in the biometric system, based on the order of working.

Answer:- will update soon and notify on telegram

quizxp telegram

Q10. Given below are two statements.Statement I: PAP provides better authentication than SPAP.Statement II: CHAP and MS-CHAP are used for remote access security.From the above statements, choose the most appropriate answer from the options given below:

Answer:- d

NPTEL CYBER SECURITY ASSIGNMENT WEEK 3 ANSWERS:-

Q1. Understanding how and why the attack happens is often very important to mitigate the Cyber Attacks.

Answer:- A

quizxp telegram

Q2.A complete Intrusion Detection System requires both signature-based methods and anomaly-based procedures.

Answer:- A

Q3. Anomaly based IDS creates a trust-worthy activity model.

Answer:- A

Q4. Intrusion Prevention Systems are usually located behind a firewall to function as another filter for malicious activity.

Answer:- A

Q5. NIPS enhances the security of proprietary network.

Answer:- B

quizxp telegram

Q6. An IPS must have a file storage.

Answer:- B

Q7. Match the Vulnerability Scans

Answer:- a. Database scan
b.Application scan
c. Wireless network scan
d.Host-based scan

Q8. Match the components of WIPS with its functions

Answer:- Console
Sensor
Management server
Database server

Q9. Usually, —– regularly check for vulnerabilities and exploit the system.

Answer:- Hackers

Q10. Who are called as ethical hackers?

Answer:- White hat

Q11. To help detect vulnerabilities _______ tools can be used to locate flaws in networks or programs.

Answer:- scanner

Q12. ________ IDS are systems used in external environment.

Answer:- Host

Q13. _______ finds the cause of attack based on the history.

Answer:- Host-based Scan

Q14. _______ is a system used to examine a network in addition to protect the confidentiality, integrity and availability of a network.

Answer:- NIPS

Q15. Which of the following is correct?

Answer:- A

Q16. This scanning finds out the open nodes on a specific host or multiple hosts on the network by scanning.

Answer:- A

Q17. Which of the following is a risk management strategy?

Answer:- D

Q18. Security compromise in a network occurs mainly due to this.

Answer:- C

Q19. These are technical extension of IDS.

Answer:- A

Q20. Which of the following is the threat preclusion technique that observes network traffic flows for vulnerability exploits?

Answer:- A

NPTEL CYBER SECURITY ASSIGNMENT WEEK 2 ANSWERS:-

Q1. Which of the following denotes the deliberate exploitation of computer systems and its resources connected through Internet?

Answer:- D – Cyber Attack

Q2.Recall the attack that consumes network bandwidth and flood the networks with data.

Answer:- B – Volume based attack

Q3. Label the serious type of Ad-hoc attack.

Answer:- C- Application attack

quizxp telegram

Q4.Figure out the action of pretending to be a licensed venture and sending fake e-mails to users.

Answer:- A – Phishing

Q5. Indicate the type of attack which is used for scattering Malware.

Answer:- A –  Drive-by download attack

Q6. Recognize the type of threat where one has physical access to the network with authorized account or server access.

Answer:- C –  Internal threats

Q7. Recognize the type of malwares that hide themselves in various cycles of encryption and decryption.

Answer:- C –  Polymorphic Viruses

quizxp telegram

Q8. Point out the type of DoS attack where fragmented packets are sent to the target machine.

Answer:- B –  Tear drop attack

Q9. Recall the type of malwares which are basically attached to executable code or exe files.

Answer:- D –  File infectors

Q10. Match the malware breakdown types.
i. Wannacry – a. Botnet
ii. Mirai – b. Ransomware
iii. NanoCore – c. Remote Access Trojan (RAT)

Answer:- B –  i-b, ii-a, iii-c

quizxp telegram

Q11. Identify the Common Weaknesses in Computer Systems and Networks.

Answer:- A,B,C

Q12. Specify the countermeasures to TCP SYN flood attack.

Answer:- B,C,D

Q13. Give Examples for non-malicious attack.

Answer:- A,B

Q14. Hackers make use of user cookies as they record

Answer:- B,C,D

quizxp telegram

Q15. Identify the common properties of viruses and worms.

Answer:- A,D

Q16. Identify the incorrect statements from the given options.

Answer:- B,D

Q17. Choose the correct statements from the given options.

Answer:- A,C

Q18. Label out the protective measures taken by developers against XSS attacks.

Answer:-B,C

quizxp telegram

Q19. List out the common mechanisms to validate user’s information system.

Answer:- A,B,C,D

Q20. Give examples for Ransomware.

Answer:- A,C

NOTE:- WE DO NOT CLAIM 100% ANSWERS OF NPTEL CYBER SECURITY ARE CORRECT AND THESE ANSWERS ARE BASED ON OUR KNOWLEDGE AND WE DO NOT PROMOTE CHEATING. SO KINDLY DO NOT JUST COPY PASTE.

NPTEL CYBER SECURITY ASSIGNMENT WEEK 1 ANSWERS:-

Q1.Which of the following level of Cyberspace covers everything that surrounds the essential components?

Answer:- B – Extended Cyberspace

Q2. Select the layer that compromises the components of physical and geographical network by means of data travels. 

Answer:- C – Physical Layer

Q3.This property refers to the intangible nature of cyber domain to provide seamless data sharing and communications.

Answer:- D – Interactivity

Q4. Identify the type of security that protects information from illegal access or theft thereby preserving the user privacy.

Answer:- A – Information Security

Q5. Outline the steps used to ensure the security measures involved in cyber security system.

  • A. Establishing Controls
  • B. Performing Audits
  • c. Signature Assurance
  •  D. Threat Identification

Choose the correct answer from the options given below:Invalid HTML

Answer:- A – A, B and D only

quizxp telegram

Q6.  Read the statements given below and answer them as TT, TF, FT or FF.(T – True, F – False).i. When a person uses a computer to commit an unethical act, it is known as Computer crime.ii. When users open documents from unknown sources, there is a possibility of hacking.

Answer:- A – TT

Q7. Match the following major components of cyber space with its appropriate examples.

Answer:- B – i – c, ii – d, iii – a, iv – b

Q8. Arrange the following framework of cyber infrastructure.

Components of cyber space Examples i. Physical Infrastructure                                      a. Connectivity       ii. Computer systems and software b. Modemiii. Networks between the systems c. Mobile Device iv. Intermediaries d. Operating System

Answer:- B – C, A, B, E, D

Q9. Given below are two statements.Statement I: The computers can be misused or hacked only when the sensitive data are stored. Statement II: Cyber Attacks are one among the top priorities of the Nation because of their disastrous nature. Considering the above statements, choose the most appropriate answer from the options given below:

 Choose the correct answer from the options given below

Answer:- D – Statement I is incorrect but Statement II is correct

Also check :- INTERNSHIP OPPORTUNITIES

NOTE:- WE DO NOT CLAIM 100% ANSWERS ARE CORRECT AND THESE ANSWERS ARE BASED ON OUR KNOWLEDGE AND WE DO NOT PROMOTE CHEATING. SO KINDLY DO NOT JUST COPY PASTE.