NPTEL Cyber Security and Privacy Week 4 Assignment Answer 2023

Join Our WhatsApp Group Join Now
Join Us On Telegram Join Now

NPTEL Cyber Security and Privacy Week 4 Assignment Solutions

NPTEL Cyber Security and Privacy Assignment Answers 2023

NPTEL Cyber Security and Privacy Week 4 Assignment Answer 2023

1. Which term is used to describe detailed statements of what must be done to comply with policy?

  • Policies
  • Standards
  • Ethics
  • Governance
Answer :- For Answer Click Here

2. Management must use ——————-as the basis for all information security planning, design, and deployment.

  • Standards
  • Procedures
  • Policies
  • Best business practices
Answer :- For Answer Click Here

3. Which type of planning ensures that critical business functions continue if a catastrophic incident or disaster occurs?

  • Business continuity planning (BCP)
  • Contingency planning (CP)
  • Business resumption planning (BRP)
  • Disaster recovery planning (DRP)
Answer :- For Answer Click Here

4. ————– policy can be separated into two general groups (a) managerial guidance and (b) technical specifications. Select the correct options

  • Systems-Specific Security
  • Issue-Specific Security
  • Enterprise Information Security
  • None of these
Answer :- For Answer Click Here

5. The actions taken during and after a disaster falls under —————-

  • Impact assessment
  • Risk management
  • Crisis management
  • Both (a) & (b)
Answer :- For Answer Click Here

5. The actions taken during and after a disaster falls under —————-

  • Impact assessment
  • Risk management
  • Crisis management
  • Both (a) & (b)
Answer :- For Answer Click Here

6. Special Publication 800-14 of the National Institute of Standards and Technology (NIST) defines three types of security policy and chooses the

  • Violations of Policy, Business continuity planning, Response planning
  • A disaster recovery, Incident response planning, and Business continuity planning
  • Issue-specific security, Systems-specific security, Enterprise information security
  • Enterprise information security, Violations of Policy, Response planning
Answer :- For Answer Click Here

7. What are the elements of a business impact analysis?

  1. Threat attack identification
  2. Business unit analysis
  3. Attack success scenario development
  4. Potential damage assessment
  5. Subordinate plan classification
  6. Risk management
  7. Disaster management

The elements of a business impact analysis are:

1,2,3,4,5 correct
1,2,3,5,6 correct
2,3,5,6,7 correct
All are correct

Answer :- For Answer Click Here

8. Access control lists (ACLs) that govern the rights and privileges of users consist of the

  1. User access lists,
  2. Matrices,
  3. Capability, and
  4. Dedicated hardware

Choose the correct answer

1,2,3,4 are true
1,2,3 are true
Only 4 is true
All are true

Answer :- For Answer Click Here

9. The instructions a system administrator codes into a server, networking device, or a device to specify how it operates is called

  • Administration rule
  • Configuration rules
  • Networking rules
  • Security rule
Answer :- For Answer Click Here

10. Information security safeguards focus on administrative planning, organizing, leading, and controlling and that are designed by strategic planners and implemented by the organization’s security administration. These safeguards include governance and risk management together known as

  • Managerial controls
  • Operational controls
  • Technical controls
  • None of these
Answer :- For Answer Click Here

11. A lattice-based access control with rows of attributes associated with a particular subject such as a user is called

  • Access control matrix
  • Capabilities table
  • Configuration table
  • All of above
Answer :-  For Answer Click Here
Course NameCyber Security and Privacy
CategoryNPTEL Assignment Answer
Home Click Here
Join Us on TelegramClick Here

Important Links

Follow us & Join Our Groups for Latest Information
Updated by US
🔥Follow US On Google NewsClick Here
🔥WhatsApp Group Join NowClick Here
🔥Join US On TelegramClick Here
🔥WebsiteClick Here

Leave a comment