NPTEL Cyber Security and Privacy Week 5 Assignment Answer 2023

NPTEL Cyber Security and Privacy Week 5 Assignment Solutions

NPTEL Cyber Security and Privacy Week 5 Assignment Answer 2023

1. What type of policy addresses specific areas of technology, requires frequent updates, and contains a statement on the organization’s position on a specific issue?

  • Enterprise information security policy (EISP)
  • Systems-specific security policy (SysSP)
  • Automated policy (AP)
  • Issue-specific security policy (ISSP)
Answer :- For Answer Click Here

2. What are the defence strategies’ three common methods?

  1. Application of policy
  2. Education and training
  3. Business impact analysis
  4. Risk management
  5. Application of technology

Choose the correct answer.

  • 1,2,3
  • 1,2,4
  • 2,4,5
  • 1,2,5
Answer :- For Answer Click Here

3. Policy administrator is responsible for ———–

  1. creation,
  2. revision,
  3. implementation
  4. distribution, and
  5. storage

of policy in an organization. Choose the correct option

  • 1,2
  • 3
  • 3,4
  • 5
Answer :- For Answer Click Here

4. Which type of policy is frequently codified as standards and procedures to be used when configuring or maintaining systems?

  • Enterprise information security policy (EISP)
  • Systems-specific security policy (SysSP)
  • Automated policy (AP)
  • Issue-specific security policy (ISSP)
Answer :- For Answer Click Here

5. Which of the following is used to direct how issues should be addressed and technologies must be used in an organization?

  • policies
  • standards
  • ethics
  • governance
Answer :- For Answer Click Here

6. The boundary in the network within which an organization attempts to maintain security controls for securing information from threats from untrusted network areas is called ————-

  • Security peripheral
  • Security perimeter
  • Security measure
  • Security principle
Answer :- For Answer Click Here

7. Consider the following statements

  1. Statement of Purpose -What the policy is for
  2. Information Technology Security Elements – Defines information security
  3. Need for Information Technology Security – Justifies the irrelevance of information security in the organization
  4. Information Technology Security Responsibilities and Roles – Defines organizational overall business planning and security investment plan.
  • Identify the components of the EISP

3, 4
2, 3, 4
1, 2
all are true

Answer :- For Answer Click Here

8. Access Control Lists specify

  1. who can ——–the system
  2. what ———users can access
  3. when authorised users can ——–the system
  4. where authorised users can access the system from

Chose the correct words or expressions to fill in the blanks, in sequence:

  • use, authorised, access
  • authorised, access, create
  • authorised, access, use
  • administer, access, accountable
Answer :- For Answer Click Here

9. The goals of (A)—————————— are:
1.—————— of information security with business strategy to support organizational objectives
2 —————— by executing appropriate measures to manage and mitigate threats to information resources
3. —————— by using information security knowledge and infrastructure efficiently and effectively

Choose the correct answer:

  • A-Financial security gov, 1- Tactical alignment, 2- Performance mgmt., 3- Resource mgmt.,
  • A-Information security governance,1-Strategic alignment, 2- Risk mgmt., 3- Resource mgmt.,
  • A-Data security gov, 1-Operational management, 2- Resource mgmt., 3- Risk mgmt.,
  • A-Bord of governance,1-Operational alignment, 2- Risk mgmt., 3- Resource mgmt.
Answer :- For Answer Click Here
Course NameCyber Security and Privacy
CategoryNPTEL Assignment Answer
Home Click Here
Join Us on TelegramClick Here