Cyber Security and Privacy Week 4 Nptel Answers 2024
Are you looking for Cyber Security and Privacy Week 4 NPTEL 2024 Answers? You’ve come to the right place! Access the latest and most accurate solutions for your Week 4 assignment in the Cyber Security and Privacy course.
Course Link: Click Here
Table of Contents
Cyber Security and Privacy Week 4 Nptel Answers (July-Dec 2024)
Session: JUL-DEC 2024
Q1.A facility that provides only rudimentary services, with no computer hardware or peripherals is known as:
Cold site
Hot site
Warm site
Service bureau
Answer:Cold site
Q2.The amount of effort necessary to make the business function operational after the technology element is recovered is known as:
Recovery Time Objective
Work Recovery Time
Maximum Tolerable Downtime
Recovery Point Objective
Answer: Work Recovery Time
For answers or latest updates join our telegram channel: Click here to join
Q3.Contingency Planning includes:
Incident response plan
Disaster recovery plan
Business continuity plan
All the above
Answer:All the above
Q4.An investigation and assessment of the various adverse events that can affect the organization, conducted as a preliminary phase of the contingency planning process, which includes a determination of how critical a system or set of information is to the organization’s core processes and recovery priorities is known as:
Risk assessment
Business impact analysis
Crisis management
Incident damage assessment
Answer:Business impact analysis
For answers or latest updates join our telegram channel: Click here to join
Q5.The process that prepares an organization to reestablish or relocate critical business operations during a disaster that affects operations at the primary site is known as:
Business continuity planning
Disaster recovery planning
Strategic Planning
Operational planning
Answer: Disaster recovery planning
Q6. Which level of Organizational Planning typically addresses day-to-day activities and tasks?
Strategic Planning
Tactical Planning
Operational Planning
Top Management Planning
Answer: Operational Planning
For answers or latest updates join our telegram channel: Click here to join
Q7.The job function of the Chief Information Security Officer includes:
Creating a strategic information security plan with a vision for the future of information security.
Understanding fundamental business activities performed by the company and suggesting appropriate information security solutions that uniquely protect these activities.
Improving the status of information security by developing action plans, schedules, budgets, status reports and top management communications
All the above
Answer:All the above
Q8. What is the unit of analysis in the contingency planning approach?
Business Assets
Risk Assets
Business Processes
Risk Factors
Answer: Business Processes
For answers or latest updates join our telegram channel: Click here to join
Q9. Which of the following is not a possible incident indicator?
Presence of unfamiliar files
Unusual consumption of computing resources
Unusual system crashes
Activities at unexpected times
Answer: Activities at unexpected times
Q10. What is the purpose of conducting an After Action Review (AAR) in incident response?
To review and improve the effectiveness of the DRP
To review and improve the effectiveness of the BCP
To review and improve the effectiveness of the IRP
To notify law enforcement agencies
Answer:To review and improve the effectiveness of the IRP
For answers or latest updates join our telegram channel: Click here to join
These are Cyber Security and Privacy Week 4 Nptel Answers
All Weeks of Cyber Security and Privacy: Click here
For answers to additional Nptel courses, please refer to this link: NPTEL Assignment
Cyber Security and Privacy Week 4 Nptel Answers (JULY-DEC 2023)
Course Name: Cyber Security and Privacy
Course Link: Click Here
These are Cyber Security and Privacy Week 4 Nptel Answers
Q1. Which term is used to describe detailed statements of what must be done to comply with policy?
Policies
Standards
Ethics
Governance
Answer: Standards
Q2. Management must use ——————-as the basis for all information security planning, design, and deployment.
Standards
Procedures
Policies
Best business practices
Answer: Policies
These are Cyber Security and Privacy Week 4 Nptel Answers
Q3. Which type of planning ensures that critical business functions continue if a catastrophic incident or disaster occurs?
Business continuity planning (BCP)
Contingency planning (CP)
Business resumption planning (BRP)
Disaster recovery planning (DRP)
Answer: Business continuity planning (BCP)
Q4. ————– policy can be separated into two general groups (a) managerial guidance and (b) technical specifications. Select the correct options
Systems-Specific Security
Issue-Specific Security
Enterprise Information Security
None of these
Answer: Systems-Specific Security
These are Cyber Security and Privacy Week 4 Nptel Answers
Q5. The actions taken during and after a disaster falls under —————-
Impact assessment
Risk management
Crisis management
Both (a) & (b)
Answer: Crisis management
Q6. Special Publication 800-14 of the National Institute of Standards and Technology (NIST) defines three types of security policy and chooses the
Violations of Policy, Business continuity planning, Response planning
A disaster recovery, Incident response planning, and Business continuity planning
Issue-specific security, Systems-specific security, Enterprise information security
Enterprise information security, Violations of Policy, Response planning
Answer: Issue-specific security, Systems-specific security, Enterprise information security
These are Cyber Security and Privacy Week 4 Nptel Answers
Q7. What are the elements of a business impact analysis?
1. Threat attack identification
2. Business unit analysis
3. Attack success scenario development
4. Potential damage assessment
5. Subordinate plan classification
6. Risk management
7. Disaster management
The elements of a business impact analysis are:
1,2,3,4,5 correct
1,2,3,5,6 correct
2,3,5,6,7 correct
All are correct
Answer: 1,2,3,4,5 correct
These are Cyber Security and Privacy Week 4 Nptel Answers
Q8. Access control lists (ACLs) that govern the rights and privileges of users consist of the
1. User access lists,
2. Matrices,
3. Capability, and
4. Dedicated hardware
Choose the correct answer
1,2,3,4 are true
1,2,3 are true
Only 4 is true
All are true
Answer: 1,2,3 are true
Q9. The instructions a system administrator codes into a server, networking device, or a device to specify how it operates is called
Administration rule
Configuration rules
Networking rules
Security rule
Answer: Configuration rules
Q10. Information security safeguards focus on administrative planning, organizing, leading, and controlling and that are designed by strategic planners and implemented by the organization’s security administration. These safeguards include governance and risk management together known as
Managerial controls
Operational controls
Technical controls
None of these
Answer: Managerial controls
Q11. A lattice-based access control with rows of attributes associated with a particular subject such as a user is called
Access control matrix
Capabilities table
Configuration table
All of above
Answer: Capabilities table
These are Cyber Security and Privacy Week 4 Nptel Answers