This set of MCQ(multiple choice questions) focuses on the Cyber Security and Privacy NPTEL Week 3 Answers
You should practice these questions to improve fundamentals of Cyber security needed for various interviews (like company interview, campus interview, walk-in interview), entrance exams, placements and other competitive exams. All the questions in this particular section are based on only “Cyber Security and Privacy NPTEL Week 3 Answers“.
Course layout
Week 1: Assignment solutions
Week 2: Assignment solutions
Week 3: Assignment solutions
Week 4: Assignment solutions
Week 5: Assignment Solutions
Week 6: Assignment solutions
Week 7: Assignment solutions
Week 8: Assignment solutions
Week 9: Assignment solutions
Week 10: Assignment solutions
Week 11: Assignment solutions
Week 12: Assignment solutions
NOTE: You can check your answer immediately by clicking show answer button. Moreover, this set of “Cyber Security and Privacy NPTEL Week 3 Answers” contains 09 questions.
Now, start attempting the quiz.
Cyber Security and Privacy NPTEL Week 3 Answers
Q1. Which of the following terms best describes the specification of a model to be followed during the design, selection, and initial and ongoing implementation of all subsequent security controls?
a) Blueprint
b) NIST handbook
c) An information security framework
d) Security plan
Answer: c) An information security framework
Q2. True or False: SP 800-18. Guide for Developing Security Plans, is considered the foundation for a comprehensive security blueprint and framework.
a) True
b) False
Answer: a) True
Q3. One of the foundations of security architectures is the requirement to implement security in layers. This layered approach is referred to as:
a) managerial controls
b) security domain
c) redundancy
d) defense in depth
Answer: d) defense in depth
Q4. Control Objectives for information and Related Technologies is a framework created by ——- for information technology (IT) management and ———-.
a) HIPPA & information officer
b) ISO, & Security officer
c) ISACA, & IT governance
d) CISO, & Chief officer
Answer: c) ISACA, & IT governance
Q5. Three approaches to cyber security management are
1. Governance-Risk-Compliance (GRC) approach
2. ———–
3. Organizational planning approach
a) Information-driven approach
b) Security-driven approach
c) Standards-driven approach
d) Procedure-driven approach
Answer: c) Standards-driven approach
Q6. ISO/IEC 27032-2012 involves guideliness for —————–.
a) Network security
b) Cyber security
c) Risk Management
d) Governance of information security
Answer: b) Cyber security
Q7. the five goals of information security governance are
a) 1-B, 2-C, 3-D, 4-C, 5-A
b) 1-C, 2-B, 3-A, 4-B, 5-E
c) 1-E, 2-C, 3-A, 4-B, 5-D
d) 1-A, 2-B, 3-C, 4-D, 5-E
Answer: d) 1-A, 2-B, 3-C, 4-D, 5-E
Q8. Match ISO series with the corresponding topic.
a) A-1, B-2, C-3, D-4, E-5
b) A-4, B-2, C-3, D-1, E-5
c) A-2, B-1, C-3, D-5, E-4
d) A-3, B-2, C-1, D-5, E-4
Answer: a) A-1, B-2, C-3, D-4, E-5
Q9. (1) ———– is authorized by policy from senior management and is usually carried out by senior IT and information security executives, such as the (2) ———– and (3) ———-.
a) 1-ISG, 2-CIO, 3-CISO
b) 1-CO, 2-CIO, 3-CISO
c) 1-CISO, 2-CIO, 3-CO
d) 1-CISO, 2-ISG, 3-CO
Answer: a) 1-ISG, 2-CIO, 3-CISO
<< Prev- Cyber Security and Privacy Week 2 Assignment Solutions
>> Next- Cyber Security and Privacy Week 4 Assignment Solutions
DISCLAIMER: Use these answers only for the reference purpose. Quizermania doesn't claim these answers to be 100% correct. So, make sure you submit your assignments on the basis of your knowledge.
Programming in Java NPTEL week 1 quiz answers
Nptel – Deep Learning assignment solutions
For discussion about any question, join the below comment section. And get the solution of your query. Also, try to share your thoughts about the topics covered in this particular quiz.