Cyber Security and Privacy | Week 2
Session: JULY-DEC 2023
Course Name: Cyber Security and Privacy
Course Link: Click Here
These are Cyber Security and Privacy Nptel Week 2 Assignment 2 Answers
Q1. What term describes the quality or state of ownership or control of information?
confidentiality
possession
authenticity
integrity
Answer: possession
Q2. Fill in the blanks
The McCumber Cube has ——————-dimensions with ——-cells representing areas that must be addressed to secure today’s information systems.
7 and 21
4 and 27
3 and 18
3 and 27
Answer: 3 and 27
These are Cyber Security and Privacy Nptel Week 2 Assignment 2 Answers
Q3. ——————is a weakness or fault in a system or protection mechanism that opens it to attack or damage.
Threat
Vulnerability
Risk
Attack
Answer: Vulnerability
Q4. Which of the following is not a component of an organization’s Information System?
(1) Software (2) Vendors (3) People (4) Government (5) ISPs
1&3
1,2 &4
4 & 5
2,4, & 5
Answer: 2,4, & 5
These are Cyber Security and Privacy Nptel Week 2 Assignment 2 Answers
Q5. True or False:
The person responsible for the storage, maintenance, and protection of information is the data custodian.
True
False
Answer: True
Q6. Biometric data collected from users is used for——————————————– process.
Authentication
Authorization
Accountability
Privacy
Answer: Authentication
These are Cyber Security and Privacy Nptel Week 2 Assignment 2 Answers
Q7. Select the right options of the C.I.A. triad
(1) Assurance that information is shared only among authorized people or organizations
(2) Assurance that the information is complete and uncorrupted
(3) Assurance that information systems and the necessary data are not available for use when needed
(1) True (2) False (3) True
(1) False (2) False (3) True
(1) True (2) True (3) True
(1) True (2) True (3) False
Answer: (1) True (2) True (3) False
These are Cyber Security and Privacy Nptel Week 2 Assignment 2 Answers
Q8. Match the following:
A. Champion : B. Team leader C. Security policy developers D. Risk assessment specialists E. Security professionals
1. Dedicated, trained, and well-educated specialists in all aspect of information security from both a technical and non-technical 2. Individuals who understand financial risk assessment techniques, the value of organizational assets, and the security methods to be used and security technical requirements. 3 Individuals who understand the organizational culture, policies, and requirements for developing and implementing successful policies. 4. A project manager, who may be a departmental line manage or staff unit manager, who understands project management, personnel management, and information security technical requirements 5 A senior executive who promotes the project and ensure its support, both financially and administratively, at the highest levels of the organization.
A-1, B-3, C-4, D-2, E-5
A-3, B-4, C-5, D-1, E-2
A-5, B-4, C-3, D-2, E-1
A-1, B-2, C-3, D-4, E-5
Answer: A-5, B-4, C-3, D-2, E-1
Q9. Who are responsible for the security and use of a particular set of information?
Data users
Data exporter
Data custodians
Data owner
Answer: Data custodians
These are Cyber Security and Privacy Nptel Week 2 Assignment 2 Answers
Q10. True or False:
If information has a state of being genuine or original and is not a fabrication, it has the characteristic of authenticity.
True
False
Answer: True
More Weeks of Cyber Security and Privacy: Click here
More Nptel Courses: Click here

This content is uploaded for study, general information, and reference purpose only.