Cyber security and privacy | NPTEL | Week 4 Answers

This set of MCQ(multiple choice questions) focuses on the Cyber Security and Privacy NPTEL Week 4 Answers

You should practice these questions to improve fundamentals of Cyber security needed for various interviews (like company interview, campus interview, walk-in interview), entrance exams, placements and other competitive exams. All the questions in this particular section are based on only “Cyber Security and Privacy NPTEL Week 4 Answers“.

Course layout

Week 1: Assignment solutions
Week 2:
Assignment solutions
Week 3:
Assignment solutions
Week 4:
Assignment solutions

Week 5: Assignment Solutions
Week 6: Assignment solutions
Week 7: Assignment solutions
Week 8: Assignment solutions
Week 9: Assignment solutions
Week 10: Assignment solutions
Week 11: Assignment solutions
Week 12: Assignment solutions

NOTE: You can check your answer immediately by clicking show answer button. Moreover, this set of “Cyber Security and Privacy NPTEL Week 4 Answers” contains 10 questions.

Now, start attempting the quiz.

Cyber Security and Privacy NPTEL Week 4 Answers

Q1. Which term is used to describe detailed statements of what must be done to comply with policy?

a) Policies
b) Standards
c) Ethics
d) Governance

Answer: b) Standards

Cyber Security and Privacy NPTEL Week 4 Answers

Q2. Management must use __________ as the basis for all information security planning, design, and deployment.

a) Standards
b) Procedures
c) Policies
d) Best business practices

Answer: c) Policies

Q3. Which type of planning ensures that critical business functions continue if a catastrophic incident or disaster occurs?

a) Business continuity planning (BCP)
b) Contingency planning (CP)
c) Business resumption planning (BRP)
d) Disaster recovery planning (DRP)

Answer: a) Business continuity planning (BCP)

Q4. ___________ policy can be separated into two general groups (a) managerial guidance and (b) technical specification. Select the correct option.

a) Systems-Specific Security
b) Issue-Specific Security
c) Enterprise Information Security
d) None of these

Answer: c) Enterprise Information Security

Cyber Security and Privacy NPTEL Week 4 Answers

Q5. The actions taken during and after a disaster falls under _______________.

a) Impact assessment
b) Risk management
c) Crisis management
d) both a) and b)

Answer: c) Crisis management

Q6. Special Publication 800-14 of the National Institute of Standards and Technology (NIST) defines three types of security policy and chooses the

a) Violations of Policy, Business continuity planning, Response planning
b) A disaster recovery, Incident response planning, and Business continuity planning
c) Issue-specific security, Systems-specific security, Enterprise information security
d) Enterprise information security, Violations of Policy, Response planning

Answer: c)

Q7. What are the elements of a business impact analysis?
1. Threat attack identification
2. Business unit analysis
3. Attack success scenario development
4. Potential damage assessment
5. Subordinate plan classification
6. Risk management
7. Disaster management

The elements of a business impact analysis are:

a) 1,2,3,4,5 correct
b) 1,2,3,5,6 correcct
c) 2,3,5,6,7 correct
d) All are correct

Answer: d) All are correct

Cyber Security and Privacy NPTEL Week 4 Answers

Q8. Access control lists (ACLs) that govern the rights and privileges of users consist of the
1. User access lists,
2. Matrices,
3. Capability, and
4. Dedicated hardware

Choose the correct answer

a) 1,2,3,4 are true
b) 1,2,3 are true
c) Only 4 is true
d) All are true

Answer: b) 1,2,3 are true

Q9. The instructions a system administrator codes into a server, networking device, or a device to specify how it operates

a) Administration rule
b) Configuration rules
c) Networking rules
d) Security rule

Answer: b) Configuration rules

Q10. Information security safeguards focus on administrative planning, leading, and controlling and that are

a) Managerial controls
b) Operational controls
c) Technical controls
d) None of these

Answer: a) Managerial controls

Q11. A lattice-based access control with rows of attributes associated with a particular subject such as a user is called

a) Access control matrix
b) Capabilities table
c) Configuration table
d) All of above

Answer: b) Capabilities table

<< Prev- Cyber Security and Privacy Week 3 Assignment Solutions

>> Next- Cyber Security and Privacy Week 5 Assignment Solutions

DISCLAIMER: Use these answers only for the reference purpose. Quizermania doesn't claim these answers to be 100% correct. So, make sure you submit your assignments on the basis of your knowledge.

Programming in Java NPTEL week 1 quiz answers

Nptel – Deep Learning assignment solutions

For discussion about any question, join the below comment section. And get the solution of your query. Also, try to share your thoughts about the topics covered in this particular quiz.

Leave a Comment

Your email address will not be published. Required fields are marked *