NPTEL Edge Computing Week 7 Assignment Answers 2025

NPTEL Edge Computing Week 7 Assignment Answers 2025

1. Which attack exploits communication signals in edge computing to infer sensitive data?

  • Malware injection
  • Authentication bypass
  • DDoS attack
  • Side-channel attack
Answer :- For Answers Click Here 

2. What is the main weakness of coarse-grained access control in MEC systems?

  • High resource consumption
  • Complex configuration
  • Lack of flexibility for specific permissions
  • Incompatibility with cloud systems
Answer :- 

3. If a side-channel attack observes power consumption data every 10 ms and collects 100
samples, how long does the attack run?

  • 1 second
  • 10 seconds
  • 100 seconds
  • 0.1 second
Answer :- 

4. A server mitigates a flooding-based attack by filtering 75% of 10,000 incoming packets
per second. How many packets per second reach the server?

  • 7,500
  • 5,000
  • 10,000
  • 2,500
Answer :- 

5. What is the primary goal of overprivileged attacks in IoT systems?

  • To exploit network vulnerabilities
  • To access unauthorized resources
  • To overload server hardware
  • To modify encryption keys
Answer :- 

6. In flooding-based attacks, which protocol is exploited in a SYN flood attack?

  • TCP
  • UDP
  • ICMP
  • FTP
Answer :- For Answers Click Here 

7. An edge server processes 1,000 legitimate requests per second but faces a DDoS attack
with 5,000 malicious requests per second. What percentage of the total requests are
legitimate?

  • 20%
  • 50%
  • 16.67%
  • 10%
Answer :- 

8. Which defense mechanism prevents brute-force attacks on authentication systems?

  • Deep Packet Inspection
  • Two-Factor Authentication
  • Role-Based Access Control
  • Dynamic Code Obfuscation
Answer :- 

9. What kind of malware targets IoT devices by exploiting their firmware vulnerabilities?

  • Ransomware
  • IoT Reaper
  • Spyware
  • Rootkit
Answer :- 

10. Which of the following is a key vulnerability exploited in Zero-Day DDoS attacks?

  • Protocol design flaws
  • Firmware bugs
  • Unknown code-level vulnerabilities
  • Insufficient bandwidth
Answer :- For Answers Click Here 
Scroll to Top