NPTEL Cyber Security and Privacy Week 2 Assignment Answers 2024 (July-October)
The NPTEL Cyber Security and Privacy course, offered from July to October 2024, continues to challenge and educate students on crucial aspects of information security. Week 2's assignment focuses on deepening the understanding of key security principles, and here we provide a comprehensive guide to the assignment questions and their answers
Question 1:
CIAA refers to:
- A) Confidentiality, Integrity and Availability
- B) Confidentiality, Integrity and Authentication
- C) Confidentiality, Integrity and Authorization
- D) Cybersecurity, Investigation and Authentication
Answer:
- A) Confidentiality, Integrity and Availability
Reason: CIAA typically stands for Confidentiality, Integrity, and Availability. These are the three core principles of information security.
Question 2:
What aspect emerges from the intersection of 3 components of Information Security?
- A) Technology
- B) Policy
- C) Human Security
- D) None of the above
Answer:
- C) Human Security
Reason: Human Security often emerges as a crucial aspect because it involves awareness and actions taken by individuals, which are influenced by technology and policy.
Question 3:
___________, authentication and authorization are means to ensure CIA.
- A) Investigation
- B) Identification
- C) Classification
- D) Verification
Answer:
- B) Identification
Reason: Identification, along with authentication and authorization, helps in ensuring the confidentiality, integrity, and availability of information.
Question 4:
Should all 27 cells of McCumber’s Cube be addressed with the same priority?
- A) True
- B) False
Answer:
- B) False
Reason: Not all cells of McCumber’s Cube require the same priority. The priority depends on the specific context and requirements of the security situation.
Question 5:
Which of the following is are design principles of high availability systems?
- A) Eliminate single points of failure
- B) Ensure reliable crossover
- C) Identify failures in real time
- D) All the above
Answer:
- D) All the above
Reason: High availability systems are designed to eliminate single points of failure, ensure reliable crossover, and identify failures in real time to maintain continuous operation.
Question 6:
In ensuring confidentiality, what is the crucial process that involves classifying information and individuals, and mapping them based on the level of access?
- A) Identification
- B) Authentication
- C) Authorization
- D) Encryption
Answer:
- C) Authorization
Reason: Authorization is the process of mapping information and individuals based on the level of access to ensure confidentiality.
Question 7:
In addition to cryptography, a number of measures may be used for confidentiality, including:
- A) Information classification
- B) Secure document storage
- C) Application of general security policies
- D) All the above
Answer:
- D) All the above
Reason: Confidentiality can be ensured through various measures such as information classification, secure document storage, and the application of general security policies.
Question 8:
When a control provides assurance that every activity undertaken can be attributed to a named person or automated process, it is known as:
- A) Integrity
- B) Accountability
- C) Accessibility
- D) Authenticity
Answer:
- B) Accountability
Reason: Accountability ensures that every action can be traced back to a specific individual or process, providing a clear audit trail.
Question 9:
Identify the components of Information Security
- A) Network Security
- B) Computer & Data Security
- C) Management of Information Security
- D) All of the above
Answer:
- D) All of the above
Reason: Information security encompasses network security, computer and data security, and the management of information security practices.
Question 10:
Which are the three types of power McCumber’s Cube identifies?
- A) Technologies
- B) Policies and Practices
- C) People
- D) All the above
Answer:
- D) All the above
Reason: McCumber’s Cube identifies technologies, policies and practices, and people as the three critical components of information security.