NPTEL Edge Computing Week 7 Assignment Answers 2025
1. Which attack exploits communication signals in edge computing to infer sensitive data?
- Malware injection
- Authentication bypass
- DDoS attack
- Side-channel attack
Answer :- For Answers Click Here
2. What is the main weakness of coarse-grained access control in MEC systems?
- High resource consumption
- Complex configuration
- Lack of flexibility for specific permissions
- Incompatibility with cloud systems
Answer :-
3. If a side-channel attack observes power consumption data every 10 ms and collects 100
samples, how long does the attack run?
- 1 second
- 10 seconds
- 100 seconds
- 0.1 second
Answer :-
4. A server mitigates a flooding-based attack by filtering 75% of 10,000 incoming packets
per second. How many packets per second reach the server?
- 7,500
- 5,000
- 10,000
- 2,500
Answer :-
5. What is the primary goal of overprivileged attacks in IoT systems?
- To exploit network vulnerabilities
- To access unauthorized resources
- To overload server hardware
- To modify encryption keys
Answer :-
6. In flooding-based attacks, which protocol is exploited in a SYN flood attack?
- TCP
- UDP
- ICMP
- FTP
Answer :- For Answers Click Here
7. An edge server processes 1,000 legitimate requests per second but faces a DDoS attack
with 5,000 malicious requests per second. What percentage of the total requests are
legitimate?
- 20%
- 50%
- 16.67%
- 10%
Answer :-
8. Which defense mechanism prevents brute-force attacks on authentication systems?
- Deep Packet Inspection
- Two-Factor Authentication
- Role-Based Access Control
- Dynamic Code Obfuscation
Answer :-
9. What kind of malware targets IoT devices by exploiting their firmware vulnerabilities?
- Ransomware
- IoT Reaper
- Spyware
- Rootkit
Answer :-
10. Which of the following is a key vulnerability exploited in Zero-Day DDoS attacks?
- Protocol design flaws
- Firmware bugs
- Unknown code-level vulnerabilities
- Insufficient bandwidth
Answer :- For Answers Click Here