Cyber Security and Privacy Week 2 Nptel 2024 Answers
Are you looking for Cyber Security and Privacy Week 2 NPTEL 2024 Answers? You’ve come to the right place! Access the latest and most accurate solutions for your Week 2 assignment in the Cyber Security and Privacy course.
Course Link: Click Here
Cyber Security and Privacy Week 2 Nptel 2024 Answers
Session: JUL-DEC 2024
Q1.CIA triad refers to:
Confidentiality, Integrity and Availability
Confidentiality, Integrity and Authentication
Confidentiality, Integrity and Authorization
Cybersecurity, Investigation and Authentication
Answer: Confidentiality, Integrity and Availability
Q2.What aspect emerges from the intersection of 3 components of Information Security?
Technology
Policy
Human Security
None of the above
Answer: Policy
For answers or latest updates join our telegram channel: Click here to join
These are Cyber Security and Privacy Week 2 Nptel 2024 Answers
Q3. ————-, authentication and authorization are means to ensure CIA.
Investigation
Identification
Classification
Verification
Answer: Identification
Q4.Should all 27 cells of McCumber’s Cube be addressed with the same priority?
True
False
Answer: False
For answers or latest updates join our telegram channel: Click here to join
These are Cyber Security and Privacy Week 2 Nptel 2024 Answers
Q5.Which of the following is/ are the design principles of high availability systems?
Eliminate single points of failure
Ensure reliable crossover
Identify failures in real time
All the above
Answer: All the above
Q6. In ensuring confidentiality, what is the crucial process that involves classifying information and individuals, and mapping them based on the level of access?
Identification
Authentication
Authorization
Encryption
Answer: Identification
For answers or latest updates join our telegram channel: Click here to join
These are Cyber Security and Privacy Week 2 Nptel 2024 Answers
Q7.In addition to cryptography, a number of measures may be used for confidentiality, including:
Information classification
Secure document storage
Application of general security policies
All the above
Answer: All the above
Q8. When a control provides assurance that every activity undertaken can be attributed to a named person or automated process, it is known as:
Integrity
Accountability
Accessibility
Authenticity
Answer: Accountability
For answers or latest updates join our telegram channel: Click here to join
These are Cyber Security and Privacy Week 2 Nptel 2024 Answers
Q9. Identify the components of Information Security
Network Security
Computer & Data Security
Management of Information Security
All of the above
Answer: All of the above
Q10. Which are the three types of power McCumber’s Cube identifies?
Technologies
Policies and Practices
People
All the above
Answer: All the above
For answers or latest updates join our telegram channel: Click here to join
These are Cyber Security and Privacy Week 2 Nptel 2024 Answers
All Weeks of Cyber Security and Privacy: Click here
For answers to additional Nptel courses, please refer to this link: NPTEL Assignment Answers