Cyber Security and Privacy Week 9 Nptel Answers 2024
Are you looking for Cyber Security and Privacy Week 9 Nptel Answers? You’ve come to the right place! Access the latest and most accurate solutions for your Week 9 assignment in the Cyber Security and Privacy course.
Course Link: Click Here
Table of Contents
Cyber Security and Privacy Week 9 Nptel Answers (July-Dec 2024)
- Which of the following is not true about Blockchains?
A) Blockchain ensures confidentiality through encryption.
B) Blockchain ensures integrity through hashing.
C) Properties such as hiding, and collision resistance help blockchains make transactions permanent.
D) Blockchains are implemented as queues.
Answer: D) Blockchains are implemented as queues.
- What is the block size and key size of the Data Encryption Standard (DES)?
A) Block size: 64 bits, key size: 56 bits
B) Block size: 56 bits, key size: 64 bits
C) Block size: 64 bits, key size: 64 bits
D) Block size: 56 bits, key size: 56 bits
Answer: A) Block size: 64 bits, key size: 56 bits
- What is the purpose of the cryptography in the RSA algorithm?
A) To encrypt messages using a public key and decrypt them using a private key
B) To encrypt messages using a private key and decrypt them using a public key
C) To generate a random key for encrypting messages
D) To securely transmit keys over an insecure network
Answer:A) To encrypt messages using a public key and decrypt them using a private key
- What is the term used to describe the concept where customers or partners can be held accountable for transactions, such as online purchases, which they cannot later dispute?
A) Unquestionability
B) Nonreversal
C) Nonrepudiation
D) Indisputability
Answer: C) Nonrepudiation
- In the context of information security, what distinguishes Personally Identifiable Information (PII) from other data?
A) Its susceptibility to malware attacks.
B) Its encryption level for secure transmission.
C) Its uniqueness or proximity to a specific individual.
D) Its accessibility through public databases.
Answer: C) Its uniqueness or proximity to a specific individual.
- Who is considered the “Father of Modern Day Information Privacy”?
A) Alan Westin
B) Alan Turing
C) Louis Brandeis
D) Samuel Warren
Answer: A) Alan Westin
These are Cyber Security and Privacy Week 9 Nptel Answers
- What is the core principle of informational privacy?
A) The right to remain anonymous at all times.
B) The complete elimination of all personal data collection.
C) The responsibility of companies to prioritize profits over user privacy.
D) The ability of individuals to decide what personal information they share and with whom.
Answer: D) The ability of individuals to decide what personal information they share and with whom.
- The FIPPs were first introduced in a report by:
A) The Federal Trade Commission (FTC)
B) The European Union
C) The US Secretary’s Advisory Committee on Automated Personal Data Systems
D) A private industry consortium
Answer: C) The US Secretary’s Advisory Committee on Automated Personal Data Systems
- Which of the following aspects of data privacy is NOT explicitly addressed in the FIPP?
A) The right to be forgotten
B) The ability to access and correct personal data
C) The requirement for secret personal data record-keeping systems
D) The need for individual consent for data collection
Answer:A) The right to be forgotten
- Which of the following statements BEST reflects the “reductionist” view?
A) Privacy is a fundamental right, independent of other rights.
B) Privacy is seen as a derivative right, stemming from other fundamental rights like property or bodily security.
C) There is no such thing as privacy; it’s an outdated concept
D) Privacy is crucial for economic efficiency.
Answer: B) Privacy is seen as a derivative right, stemming from other fundamental rights like property or bodily security.
These are Cyber Security and Privacy Week 9 Nptel Answers
All Weeks of Cyber Security and Privacy: Click here
For answers to additional Nptel courses, please refer to this link: NPTEL Assignment
Cyber Security and Privacy Week 9 Nptel Answers (July-Dec 2023)
Course Name: Cyber Security and Privacy
Course Link: Click Here
These are Nptel Cyber Security and Privacy Assignment 9 Answers
Q1. What is the maximum fine for GDPR non-compliance?
EUR 10mn or 2% global turnover
EUR 15mn or 3% global turnover
EUR 20mn or 4% global turnover
EUR 25mn or 5% global turnover
Answer: EUR 20mn or 4% global turnover
Q2. Richards and Solove (2007) suggest that while the American derivation of general privacy is grounded in one’s ——————–
inviolate personality
violate personality
serious personality
funny personality
Answer: inviolate personality
These are Nptel Cyber Security and Privacy Assignment 9 Answers
Q3. Cohenretism treats privacy as a
Permission
Order
Freedom
Distinct right
Answer: Distinct right
Q4. True/ or False?
Confidentiality is concerned with the externalization of restricted but accurate information to a specific entity.
True
False
Answer: True
These are Nptel Cyber Security and Privacy Assignment 9 Answers
Q5. Being observed, while the subject doesn’t know is
Panopticon
Transparency
Prevention
Anonymity
Answer: Panopticon
Q6. Concerns for Information Privacy (CFIP) has four constructs. Which is a construct that is not part of the CFIP?
Collection
Unauthorized access
Autonomy
Errors
Answer: Autonomy
These are Nptel Cyber Security and Privacy Assignment 9 Answers
Q7. According to ——————— privacy is not a distinct value concept because it could be conceptually reduced to other values, like liberty
Coherentism
Reductionism
Privacy
Security
Answer: Reductionism
These are Cyber Security and Privacy Nptel Week 9 Assignment 9 Answers
Q8. ……………… determines the purposes and means of processing personal data
Data fiduciary
Data processor
Data principle
Data users
Answer: Data fiduciary
Q9. A IPL team management contracts a market research specialist team to carry out players satisfaction survey. The IPL team specifies the budget and the deadline, but the market research team determines sample sizes and interview methods. The market research team decides which player to select for the interview, what information will be collected, how the information will be collected, and how the information will be presented to the IPL team management. Who is the data controller in this situation?
An IPL team management
Market research firm
Both a & b are controllers
None of them are controllers
Answer: Both a & b are controllers
These are Cyber Security and Privacy Nptel Week 9 Assignment 9 Answers
Q10. Fair Information Practice (FIP) principles were developed the United States in response to increasing privacy concerns resulting from massive computerization. What is an issue FIP does not address?
secret record-keeping systems
access by data subject to information stored in record keeping systems
ability by data subject to correct errors in one’s own data
data localization
Answer: data localization
These are Nptel Cyber Security and Privacy Assignment 9 Answers