Cyber security and privacy | NPTEL | Week 6 Answers

This set of MCQ(multiple choice questions) focuses on the Cyber Security and Privacy NPTEL Week 6 Answers

You should practice these questions to improve fundamentals of Cyber security needed for various interviews (like company interview, campus interview, walk-in interview), entrance exams, placements and other competitive exams. All the questions in this particular section are based on only “Cyber Security and Privacy NPTEL Week 6 Answers“.

Course layout

Week 1: Assignment solutions
Week 2:
Assignment solutions
Week 3:
Assignment solutions
Week 4:
Assignment solutions

Week 5: Assignment Solutions
Week 6: Assignment solutions
Week 7: Assignment solutions
Week 8: Assignment solutions
Week 9: Assignment solutions
Week 10: Assignment solutions
Week 11: Assignment solutions
Week 12: Assignment solutions

NOTE: You can check your answer immediately by clicking show answer button. Moreover, this set of “Cyber Security and Privacy NPTEL Week 6 Answers” contains 10 questions.

Now, start attempting the quiz.

Cyber Security and Privacy NPTEL Week 6 Answers

Q1. Match 1 & 2 with A & B following
1. Residual risk
2. Risk appetite
A: The risk to infirmation assets that remains even after current controls have been applied.
B: The quantity and nature of risk that organizations are willing to accept as they evaluate the trade-offs between perfect security and unlimited accessbility.
Choose the correct answer:

a) 1-A, 2-B
b) 1-B, 2-A

Answer: a) 1-A, 2-B

Cyber Security and Privacy NPTEL Week 6 Answers

Q2. True or False:
The information technology community of interest must assist in risk management by configuring and operating information systems in a secure fashion.

a) True
b) False

Answer: a) True

Q3. The process of examining how each threat will affect an organization is called:

a) Risk assessment
b) Data classification
c) Threat assessment
d) Vulnerability classification

Answer: c) Threat assessment

Cyber Security and Privacy NPTEL Week 6 Answers

Q4. The probability that a specific vulnerability within an organization will be the target of an attack is known as:

a) Loss Magnitude
b) Manageability
c) Likelihood
d) Practicability

Answer: c) Likelihood

Cyber Security and Privacy NPTEL Week 6 Answers

Q5. The calculation of the value associated with the most likely loss from an attack is called:

a) Annualised Rate of Occurrence (ARO)
b) Annualised Loss Expectancy (ALE)
c) Cost Benefit Analysis (CBA)
d) Single Loss Expectancy (SLE)

Answer: d) Single Loss Expectancy (SLE)

Q6. _____________ is the formal assessment and presentation of the economic expenditures needed for particular security control, contrasted with its projected value to the organization.

a) Feasibility analysis
b) Cost-benefit analysis
c) Risk-benefit analysis
d) Economic impact analysis

Answer: b) Cost-benefit analysis

Q7. A document that compares the relative importance of prioritised assets to prioritised threats and highlights any weaknesses in the asset/threat pairs.

a) Threats-Vulnerabilities document
b) Threats-Vulnerabilities-Assets (TVA) worksheet
c) Threats-Vulnerabilities-Assets log file
d) Attack Vulnerability Asset document

Answer: b) Threats-Vulnerabilities-Assets (TVA) worksheet

Cyber Security and Privacy NPTEL Week 6 Answers

Q8. Match the following:

a) A-2, B-1, C-3
b) A-1, B-2, C-3
c) A-3, B-2, C-1
d) A-1, B-3, C-2

Answer: b) A-1, B-2, C-3

Q9. ____________ varies among organisations because they maintain different balances between the expense of controlling vulnerabilities and the possible losses if the vulnerabilities are exploited. The key for each organisation is to find the proper balance in its decision-making and feasibility analyses, to use experience and facts instead of ignorance or wishful thinking.

a) Risk appetite
b) Risk control
c) Residual Risk
d) Risk Assessment

Answer: a) Risk appetite

Cyber Security and Privacy NPTEL Week 6 Answers

Q10. Malware dictation Software has its own (Asset) internal personnel database behind a firewall. Industry reports indicate a 5% chance of an attack. The information security and IT departments report that if the organization is attacked, the attack has a 15% chance of success based on current asset vulnerabilities and protection mechanisms. The asset is valued at a score of 35 on a scale of 0 to 100, and information security and IT staff expect that 60% of the asset would be lost or compromised by a successful attack, because not all of the asset is stored in a single location. You estimate that the assumptions and data are 90% accurate. Calculating Risk.

a) 0.1575
b) 0.1733
c) 0.2887
d) 0.5575

Answer: d) 0.5575

Cyber Security and Privacy NPTEL Week 6 Answers

<< Prev- Cyber Security and Privacy Week 5 Assignment Solutions

>> Next- Cyber Security and Privacy Week 7 Assignment Solutions

DISCLAIMER: Use these answers only for the reference purpose. Quizermania doesn't claim these answers to be 100% correct. So, make sure you submit your assignments on the basis of your knowledge.

Programming in Java NPTEL week 1 quiz answers

Nptel – Deep Learning assignment solutions

For discussion about any question, join the below comment section. And get the solution of your query. Also, try to share your thoughts about the topics covered in this particular quiz.

Leave a Comment

Your email address will not be published. Required fields are marked *