makautnotes.in Provides makaut Previous Year Question Papers & Notes, answer keys, organizer, syllabus

Find your queries what you want today🙂 but first join my telegram group

NPTEL Cyber Security and Privacy Week 2 Assignment Answers 2024 (July-October)

NPTEL Cyber Security and Privacy Week 2 Assignment Answers 2024 (July-October)

The NPTEL Cyber Security and Privacy course, offered from July to October 2024, continues to challenge and educate students on crucial aspects of information security. Week 2's assignment focuses on deepening the understanding of key security principles, and here we provide a comprehensive guide to the assignment questions and their answers

NPTEL Cyber Security and Privacy Week 2 Assignment Answers 2024 (July-October)


Question 1:

CIAA refers to:

  • A) Confidentiality, Integrity and Availability
  • B) Confidentiality, Integrity and Authentication
  • C) Confidentiality, Integrity and Authorization
  • D) Cybersecurity, Investigation and Authentication

Answer:

  • A) Confidentiality, Integrity and Availability

Reason: CIAA typically stands for Confidentiality, Integrity, and Availability. These are the three core principles of information security.


Question 2:

What aspect emerges from the intersection of 3 components of Information Security?

  • A) Technology
  • B) Policy
  • C) Human Security
  • D) None of the above

Answer:

  • C) Human Security

Reason: Human Security often emerges as a crucial aspect because it involves awareness and actions taken by individuals, which are influenced by technology and policy.


Question 3:

___________, authentication and authorization are means to ensure CIA.

  • A) Investigation
  • B) Identification
  • C) Classification
  • D) Verification

Answer:

  • B) Identification

Reason: Identification, along with authentication and authorization, helps in ensuring the confidentiality, integrity, and availability of information.


Question 4:

Should all 27 cells of McCumber’s Cube be addressed with the same priority?

  • A) True
  • B) False

Answer:

  • B) False

Reason: Not all cells of McCumber’s Cube require the same priority. The priority depends on the specific context and requirements of the security situation.


Question 5:

Which of the following is are design principles of high availability systems?

  • A) Eliminate single points of failure
  • B) Ensure reliable crossover
  • C) Identify failures in real time
  • D) All the above

Answer:

  • D) All the above

Reason: High availability systems are designed to eliminate single points of failure, ensure reliable crossover, and identify failures in real time to maintain continuous operation.


Question 6:

In ensuring confidentiality, what is the crucial process that involves classifying information and individuals, and mapping them based on the level of access?

  • A) Identification
  • B) Authentication
  • C) Authorization
  • D) Encryption

Answer:

  • C) Authorization

Reason: Authorization is the process of mapping information and individuals based on the level of access to ensure confidentiality.


Question 7:

In addition to cryptography, a number of measures may be used for confidentiality, including:

  • A) Information classification
  • B) Secure document storage
  • C) Application of general security policies
  • D) All the above

Answer:

  • D) All the above

Reason: Confidentiality can be ensured through various measures such as information classification, secure document storage, and the application of general security policies.


Question 8:

When a control provides assurance that every activity undertaken can be attributed to a named person or automated process, it is known as:

  • A) Integrity
  • B) Accountability
  • C) Accessibility
  • D) Authenticity

Answer:

  • B) Accountability

Reason: Accountability ensures that every action can be traced back to a specific individual or process, providing a clear audit trail.


Question 9:

Identify the components of Information Security

  • A) Network Security
  • B) Computer & Data Security
  • C) Management of Information Security
  • D) All of the above

Answer:

  • D) All of the above

Reason: Information security encompasses network security, computer and data security, and the management of information security practices.


Question 10:

Which are the three types of power McCumber’s Cube identifies?

  • A) Technologies
  • B) Policies and Practices
  • C) People
  • D) All the above

Answer:

  • D) All the above

Reason: McCumber’s Cube identifies technologies, policies and practices, and people as the three critical components of information security.



Tags

Post a Comment

0 Comments
* Please Don't Spam Here. All the Comments are Reviewed by Admin.

Top Post Ad

Telegram Group For Nptel Answer Keys Join Now

html 5

lagged02

 

gamelix