Cyber Security and Privacy | Week 4

Session: JULY-DEC 2023

Course Name: Cyber Security and Privacy

Course Link: Click Here

These are Cyber Security and Privacy Nptel Week 4 Assignment 4 Answers


Q1. Which term is used to describe detailed statements of what must be done to comply with policy?
Policies
Standards
Ethics
Governance

Answer: Standards


Q2. Management must use ——————-as the basis for all information security planning, design, and deployment.
Standards
Procedures
Policies
Best business practices

Answer: Policies


These are Cyber Security and Privacy Nptel Week 4 Assignment 4 Answers


Q3. Which type of planning ensures that critical business functions continue if a catastrophic incident or disaster occurs?
Business continuity planning (BCP)
Contingency planning (CP)
Business resumption planning (BRP)
Disaster recovery planning (DRP)

Answer: Business continuity planning (BCP)


Q4. ————– policy can be separated into two general groups (a) managerial guidance and (b) technical specifications. Select the correct options
Systems-Specific Security
Issue-Specific Security
Enterprise Information Security
None of these

Answer: Systems-Specific Security


These are Cyber Security and Privacy Nptel Week 4 Assignment 4 Answers


Q5. The actions taken during and after a disaster falls under —————-
Impact assessment
Risk management
Crisis management
Both (a) & (b)

Answer: Crisis management


Q6. Special Publication 800-14 of the National Institute of Standards and Technology (NIST) defines three types of security policy and chooses the
Violations of Policy, Business continuity planning, Response planning
A disaster recovery, Incident response planning, and Business continuity planning
Issue-specific security, Systems-specific security, Enterprise information security
Enterprise information security, Violations of Policy, Response planning

Answer: Issue-specific security, Systems-specific security, Enterprise information security


These are Cyber Security and Privacy Nptel Week 4 Assignment 4 Answers


Q7. What are the elements of a business impact analysis?
1. Threat attack identification
2. Business unit analysis
3. Attack success scenario development
4. Potential damage assessment
5. Subordinate plan classification
6. Risk management
7. Disaster management
The elements of a business impact analysis are:

1,2,3,4,5 correct
1,2,3,5,6 correct
2,3,5,6,7 correct
All are correct

Answer: 1,2,3,4,5 correct


These are Cyber Security and Privacy Nptel Week 4 Assignment 4 Answers


Q8. Access control lists (ACLs) that govern the rights and privileges of users consist of the
1. User access lists,
2. Matrices,
3. Capability, and
4. Dedicated hardware
Choose the correct answer

1,2,3,4 are true
1,2,3 are true
Only 4 is true
All are true

Answer: 1,2,3 are true


Q9. The instructions a system administrator codes into a server, networking device, or a device to specify how it operates is called
Administration rule
Configuration rules
Networking rules
Security rule

Answer: Configuration rules


Q10. Information security safeguards focus on administrative planning, organizing, leading, and controlling and that are designed by strategic planners and implemented by the organization’s security administration. These safeguards include governance and risk management together known as
Managerial controls
Operational controls
Technical controls
None of these

Answer: Managerial controls


Q11. A lattice-based access control with rows of attributes associated with a particular subject such as a user is called
Access control matrix
Capabilities table
Configuration table
All of above

Answer: Capabilities table


These are Cyber Security and Privacy Nptel Week 4 Assignment 4 Answers


More Weeks of Cyber Security and Privacy: Click here

More Nptel Courses: Click here

These are Cyber Security and Privacy Nptel Week 4 Assignment 4 Answers
The content uploaded on this website is for reference purposes only. Please do it yourself first.