Cyber Security and Privacy Week 9 Nptel Answers 2024

Are you looking for Cyber Security and Privacy Week 9 Nptel Answers? You’ve come to the right place! Access the latest and most accurate solutions for your Week 9 assignment in the Cyber Security and Privacy course.

Course Link: Click Here


Correct Cyber Security and Privacy Week 9 Nptel Answers 2024 image
Cyber Security and Privacy Week 9 Nptel Answers

Cyber Security and Privacy Week 9 Nptel Answers (July-Dec 2024)


  1. Which of the following is not true about Blockchains?
    A) Blockchain ensures confidentiality through encryption.
    B) Blockchain ensures integrity through hashing.
    C) Properties such as hiding, and collision resistance help blockchains make transactions permanent.
    D) Blockchains are implemented as queues.

Answer: D) Blockchains are implemented as queues.


  1. What is the block size and key size of the Data Encryption Standard (DES)?
    A) Block size: 64 bits, key size: 56 bits
    B) Block size: 56 bits, key size: 64 bits
    C) Block size: 64 bits, key size: 64 bits
    D) Block size: 56 bits, key size: 56 bits

Answer: A) Block size: 64 bits, key size: 56 bits


  1. What is the purpose of the cryptography in the RSA algorithm?
    A) To encrypt messages using a public key and decrypt them using a private key
    B) To encrypt messages using a private key and decrypt them using a public key
    C) To generate a random key for encrypting messages
    D) To securely transmit keys over an insecure network

Answer:A) To encrypt messages using a public key and decrypt them using a private key


  1. What is the term used to describe the concept where customers or partners can be held accountable for transactions, such as online purchases, which they cannot later dispute?
    A) Unquestionability
    B) Nonreversal
    C) Nonrepudiation
    D) Indisputability

Answer: C) Nonrepudiation


  1. In the context of information security, what distinguishes Personally Identifiable Information (PII) from other data?
    A) Its susceptibility to malware attacks.
    B) Its encryption level for secure transmission.
    C) Its uniqueness or proximity to a specific individual.
    D) Its accessibility through public databases.
See also  Cyber Security and Privacy Week 8 Nptel Answers 2024

Answer: C) Its uniqueness or proximity to a specific individual.


  1. Who is considered the “Father of Modern Day Information Privacy”?
    A) Alan Westin
    B) Alan Turing
    C) Louis Brandeis
    D) Samuel Warren

Answer: A) Alan Westin


These are Cyber Security and Privacy Week 9 Nptel Answers


  1. What is the core principle of informational privacy?
    A) The right to remain anonymous at all times.
    B) The complete elimination of all personal data collection.
    C) The responsibility of companies to prioritize profits over user privacy.
    D) The ability of individuals to decide what personal information they share and with whom.

Answer: D) The ability of individuals to decide what personal information they share and with whom.


  1. The FIPPs were first introduced in a report by:
    A) The Federal Trade Commission (FTC)
    B) The European Union
    C) The US Secretary’s Advisory Committee on Automated Personal Data Systems
    D) A private industry consortium

Answer: C) The US Secretary’s Advisory Committee on Automated Personal Data Systems


  1. Which of the following aspects of data privacy is NOT explicitly addressed in the FIPP?
    A) The right to be forgotten
    B) The ability to access and correct personal data
    C) The requirement for secret personal data record-keeping systems
    D) The need for individual consent for data collection

Answer:A) The right to be forgotten


  1. Which of the following statements BEST reflects the “reductionist” view?
    A) Privacy is a fundamental right, independent of other rights.
    B) Privacy is seen as a derivative right, stemming from other fundamental rights like property or bodily security.
    C) There is no such thing as privacy; it’s an outdated concept
    D) Privacy is crucial for economic efficiency.
See also  Cyber Security and Privacy | Week 11

Answer: B) Privacy is seen as a derivative right, stemming from other fundamental rights like property or bodily security.


These are Cyber Security and Privacy Week 9 Nptel Answers

All Weeks of Cyber Security and Privacy: Click here

For answers to additional Nptel courses, please refer to this link: NPTEL Assignment


Cyber Security and Privacy Week 9 Nptel Answers (July-Dec 2023)

Course Name: Cyber Security and Privacy

Course Link: Click Here

These are Nptel Cyber Security and Privacy Assignment 9 Answers


Q1. What is the maximum fine for GDPR non-compliance?
EUR 10mn or 2% global turnover
EUR 15mn or 3% global turnover
EUR 20mn or 4% global turnover
EUR 25mn or 5% global turnover

Answer: EUR 20mn or 4% global turnover


Q2. Richards and Solove (2007) suggest that while the American derivation of general privacy is grounded in one’s ——————–
inviolate personality
violate personality
serious personality
funny personality

Answer: inviolate personality


These are Nptel Cyber Security and Privacy Assignment 9 Answers


Q3. Cohenretism treats privacy as a
Permission
Order
Freedom
Distinct right

Answer: Distinct right


Q4. True/ or False?
Confidentiality is concerned with the externalization of restricted but accurate information to a specific entity.

True
False

Answer: True


These are Nptel Cyber Security and Privacy Assignment 9 Answers


Q5. Being observed, while the subject doesn’t know is
Panopticon
Transparency
Prevention
Anonymity

Answer: Panopticon


Q6. Concerns for Information Privacy (CFIP) has four constructs. Which is a construct that is not part of the CFIP?
Collection
Unauthorized access
Autonomy
Errors

Answer: Autonomy


These are Nptel Cyber Security and Privacy Assignment 9 Answers


Q7. According to ——————— privacy is not a distinct value concept because it could be conceptually reduced to other values, like liberty
Coherentism
Reductionism
Privacy
Security

See also  Cyber Security and Privacy | Week 12

Answer: Reductionism


These are Cyber Security and Privacy Nptel Week 9 Assignment 9 Answers


Q8. ……………… determines the purposes and means of processing personal data
Data fiduciary
Data processor
Data principle
Data users

Answer: Data fiduciary


Q9. A IPL team management contracts a market research specialist team to carry out players satisfaction survey. The IPL team specifies the budget and the deadline, but the market research team determines sample sizes and interview methods. The market research team decides which player to select for the interview, what information will be collected, how the information will be collected, and how the information will be presented to the IPL team management. Who is the data controller in this situation?
An IPL team management
Market research firm
Both a & b are controllers
None of them are controllers

Answer: Both a & b are controllers


These are Cyber Security and Privacy Nptel Week 9 Assignment 9 Answers


Q10. Fair Information Practice (FIP) principles were developed the United States in response to increasing privacy concerns resulting from massive computerization. What is an issue FIP does not address?
secret record-keeping systems
access by data subject to information stored in record keeping systems
ability by data subject to correct errors in one’s own data
data localization

Answer: data localization


These are Nptel Cyber Security and Privacy Assignment 9 Answers