Cyber Security and Privacy | Week 2

Session: JULY-DEC 2023

Course Name: Cyber Security and Privacy

Course Link: Click Here

These are Cyber Security and Privacy Nptel Week 2 Assignment 2 Answers


Q1. What term describes the quality or state of ownership or control of information?
confidentiality
possession
authenticity
integrity

Answer: possession


Q2. Fill in the blanks
The McCumber Cube has ——————-dimensions with ——-cells representing areas that must be addressed to secure today’s information systems.

7 and 21
4 and 27
3 and 18
3 and 27

Answer: 3 and 27


These are Cyber Security and Privacy Nptel Week 2 Assignment 2 Answers


Q3. ——————is a weakness or fault in a system or protection mechanism that opens it to attack or damage.
Threat
Vulnerability
Risk
Attack

Answer: Vulnerability


Q4. Which of the following is not a component of an organization’s Information System?
(1) Software (2) Vendors (3) People (4) Government (5) ISPs

1&3
1,2 &4
4 & 5
2,4, & 5

Answer: 2,4, & 5


These are Cyber Security and Privacy Nptel Week 2 Assignment 2 Answers


Q5. True or False:
The person responsible for the storage, maintenance, and protection of information is the data custodian.

True
False

Answer: True


Q6. Biometric data collected from users is used for——————————————– process.
Authentication
Authorization
Accountability
Privacy

Answer: Authentication


These are Cyber Security and Privacy Nptel Week 2 Assignment 2 Answers


Q7. Select the right options of the C.I.A. triad
(1) Assurance that information is shared only among authorized people or organizations
(2) Assurance that the information is complete and uncorrupted
(3) Assurance that information systems and the necessary data are not available for use when needed

(1) True (2) False (3) True
(1) False (2) False (3) True
(1) True (2) True (3) True
(1) True (2) True (3) False

Answer: (1) True (2) True (3) False


These are Cyber Security and Privacy Nptel Week 2 Assignment 2 Answers


Q8. Match the following:
A. Champion : B. Team leader C. Security policy developers D. Risk assessment specialists E. Security professionals

1. Dedicated, trained, and well-educated specialists in all aspect of information security from both a technical and non-technical 2. Individuals who understand financial risk assessment techniques, the value of organizational assets, and the security methods to be used and security technical requirements. 3 Individuals who understand the organizational culture, policies, and requirements for developing and implementing successful policies. 4. A project manager, who may be a departmental line manage or staff unit manager, who understands project management, personnel management, and information security technical requirements 5 A senior executive who promotes the project and ensure its support, both financially and administratively, at the highest levels of the organization.

A-1, B-3, C-4, D-2, E-5
A-3, B-4, C-5, D-1, E-2
A-5, B-4, C-3, D-2, E-1
A-1, B-2, C-3, D-4, E-5

Answer: A-5, B-4, C-3, D-2, E-1


Q9. Who are responsible for the security and use of a particular set of information?
Data users
Data exporter
Data custodians
Data owner

Answer: Data owner


These are Cyber Security and Privacy Nptel Week 2 Assignment 2 Answers


Q10. True or False:
If information has a state of being genuine or original and is not a fabrication, it has the characteristic of authenticity.

True
False

Answer: True


More Weeks of Cyber Security and Privacy: Click here

More Nptel Courses: Click here

These are Cyber Security and Privacy Nptel Week 2 Assignment 2 Answers
The content uploaded on this website is for reference purposes only. Please do it yourself first.