Cyber security and privacy | NPTEL | Week 5 Answers

This set of MCQ(multiple choice questions) focuses on the Cyber Security and Privacy NPTEL Week 5 Answers

You should practice these questions to improve fundamentals of Cyber security needed for various interviews (like company interview, campus interview, walk-in interview), entrance exams, placements and other competitive exams. All the questions in this particular section are based on only “Cyber Security and Privacy NPTEL Week 5 Answers“.

Course layout

Week 1: Assignment solutions
Week 2:
Assignment solutions
Week 3:
Assignment solutions
Week 4:
Assignment solutions

Week 5: Assignment Solutions
Week 6: Assignment solutions
Week 7: Assignment solutions
Week 8: Assignment solutions
Week 9: Assignment solutions
Week 10: Assignment solutions
Week 11: Assignment solutions
Week 12: Assignment solutions

NOTE: You can check your answer immediately by clicking show answer button. Moreover, this set of “Cyber Security and Privacy NPTEL Week 5 Answers” contains 10 questions.

Now, start attempting the quiz.

Cyber Security and Privacy NPTEL Week 5 Answers

Q1. What type of policy addresses specific areas of technology, requires frequent updates, and contains a statement on the organization’s position on a specific issue?

a) Enterprise information security policy (EISP)
b) System-specific security policy (SysSP)
c) Automated policy (AP)
d) Issue-specific security policy (ISSP)

Answer: d) Issue-specific security policy (ISSP)

Cyber Security and Privacy NPTEL Week 5 Answers

Q2. What are the defence strategies three common methods?
1. Application of policy
2. Education and training
3. Business impact analysis
4. Risk management
5. Application of technology
Choose the correct answer.

a) 1, 2, 3
b) 1, 2, 4
c) 2, 4, 5
d) 1, 2, 5

Answer: d) 1, 2, 5

Q3. Policy administrator is responsible for ___________.
1. creation
2. revision
3. implementation
4. distribution
5. storage
of policy in an organization. Choose the correct option.

a) 1, 2
b) 3
c) 3, 4
d) 5

Answer: a) 1, 2

Q4. Which type of policy is frequently codified as standards and procedures to be used when configuring or maintaining systems?

a) Enterprise information security policy (EISP)
b) System-specific security policy (SysSP)
c) Automated policy (AP)
d) Issue-specific security policy (ISSP)

Answer: b) System-specific security policy (SysSP)

Cyber Security and Privacy NPTEL Week 5 Answers

Q5. Which of the following is used to direct how issues should be addressed and technologies must be used in an organization?

a) policies
b) standards
c) ethics
d) governance

Answer: a) policies

Q6. The boundary in the network within which an organization attempts to maintain security controls for securing information from threats from untrusted network areas is called ____________.

a) Security peripheral
b) Security perimeter
c) Security measure
d) Security principle

Answer: b) Security perimeter

Q7. Consider the following statements
1. Statement of Purpose – What the policy is for
2. Information Technology Security Elements – Defines information security
3. Need for information Technology Security – Justifies the irrelevance of information security in the organization
4. Information technology Security Responsibilities and Roles – Defines organizational overall business planning and security investment plan.
Identify the components of EISP

a) 3, 4
b) 2, 3, 4
c) 1, 2
d) All are true

Answer: d) All are true

Cyber Security and Privacy NPTEL Week 5 Answers

Q8. Access control Lists specify
1. who can ——- the system
2. what ——– users can access
3. when authorised users can —— the system
4. where authorised users can access the system from
Choose the correct words or expressions to fill in the blanks, in sequence:

a) use, authorised, access
b) authorised, access, create
c) authorised, access, use
d) administer, access, accountable

Answer: a) use, authorised, access

Q9. The goals of (A) ——— are:
1. ——- of information security with business strategy to support organizational objectives
2. ——- by executing appropriate measures to manage and mitigate threats to information resources
3. ——- by using information security knowledge and infrastructure efficiently and effectively
Choose the correct answer:

a) A-Financial security gov, 1- Tactical alignment, 2- Performance mgmt, 3- Resource mgmt
b) A-Information security governance, 1- Strategic alignment, 2- Rist mgmt, 3- Resource mgmt
c) A-Data security gov, 1- Operational managment, 2- Resource mgmt, 3- Risk mgmt
d) A-Bord of governance, 1- Operational alignment, 2- Risk mgmt, 3- Resource mgmt

Answer: b)

<< Prev- Cyber Security and Privacy Week 4 Assignment Solutions

>> Next- Cyber Security and Privacy Week 6 Assignment Solutions

DISCLAIMER: Use these answers only for the reference purpose. Quizermania doesn't claim these answers to be 100% correct. So, make sure you submit your assignments on the basis of your knowledge.

Programming in Java NPTEL week 1 quiz answers

Nptel – Deep Learning assignment solutions

For discussion about any question, join the below comment section. And get the solution of your query. Also, try to share your thoughts about the topics covered in this particular quiz.

Leave a Comment

Your email address will not be published. Required fields are marked *