NPTEL Cyber Security and Privacy Week 2 Assignment Answers 2024 (July-October)

NPTEL Cyber Security and Privacy Week 2 Assignment Answers 2024 (July-October) The NPTEL Cyber Security and Privacy course , offered from Ju...

NPTEL Cyber Security and Privacy Week 2 Assignment Answers 2024 (July-October)

The NPTEL Cyber Security and Privacy course, offered from July to October 2024, continues to challenge and educate students on crucial aspects of information security. Week 2's assignment focuses on deepening the understanding of key security principles, and here we provide a comprehensive guide to the assignment questions and their answers

NPTEL Cyber Security and Privacy Week 2 Assignment Answers 2024 (July-October)


Question 1:

CIAA refers to:

  • A) Confidentiality, Integrity and Availability
  • B) Confidentiality, Integrity and Authentication
  • C) Confidentiality, Integrity and Authorization
  • D) Cybersecurity, Investigation and Authentication

Answer:

  • A) Confidentiality, Integrity and Availability

Reason: CIAA typically stands for Confidentiality, Integrity, and Availability. These are the three core principles of information security.


Question 2:

What aspect emerges from the intersection of 3 components of Information Security?

  • A) Technology
  • B) Policy
  • C) Human Security
  • D) None of the above

Answer:

  • C) Human Security

Reason: Human Security often emerges as a crucial aspect because it involves awareness and actions taken by individuals, which are influenced by technology and policy.


Question 3:

___________, authentication and authorization are means to ensure CIA.

  • A) Investigation
  • B) Identification
  • C) Classification
  • D) Verification

Answer:

  • B) Identification

Reason: Identification, along with authentication and authorization, helps in ensuring the confidentiality, integrity, and availability of information.


Question 4:

Should all 27 cells of McCumber’s Cube be addressed with the same priority?

  • A) True
  • B) False

Answer:

  • B) False

Reason: Not all cells of McCumber’s Cube require the same priority. The priority depends on the specific context and requirements of the security situation.


Question 5:

Which of the following is are design principles of high availability systems?

  • A) Eliminate single points of failure
  • B) Ensure reliable crossover
  • C) Identify failures in real time
  • D) All the above

Answer:

  • D) All the above

Reason: High availability systems are designed to eliminate single points of failure, ensure reliable crossover, and identify failures in real time to maintain continuous operation.


Question 6:

In ensuring confidentiality, what is the crucial process that involves classifying information and individuals, and mapping them based on the level of access?

  • A) Identification
  • B) Authentication
  • C) Authorization
  • D) Encryption

Answer:

  • C) Authorization

Reason: Authorization is the process of mapping information and individuals based on the level of access to ensure confidentiality.


Question 7:

In addition to cryptography, a number of measures may be used for confidentiality, including:

  • A) Information classification
  • B) Secure document storage
  • C) Application of general security policies
  • D) All the above

Answer:

  • D) All the above

Reason: Confidentiality can be ensured through various measures such as information classification, secure document storage, and the application of general security policies.


Question 8:

When a control provides assurance that every activity undertaken can be attributed to a named person or automated process, it is known as:

  • A) Integrity
  • B) Accountability
  • C) Accessibility
  • D) Authenticity

Answer:

  • B) Accountability

Reason: Accountability ensures that every action can be traced back to a specific individual or process, providing a clear audit trail.


Question 9:

Identify the components of Information Security

  • A) Network Security
  • B) Computer & Data Security
  • C) Management of Information Security
  • D) All of the above

Answer:

  • D) All of the above

Reason: Information security encompasses network security, computer and data security, and the management of information security practices.


Question 10:

Which are the three types of power McCumber’s Cube identifies?

  • A) Technologies
  • B) Policies and Practices
  • C) People
  • D) All the above

Answer:

  • D) All the above

Reason: McCumber’s Cube identifies technologies, policies and practices, and people as the three critical components of information security.



COMMENTS

Name

1sem,1,1st Sem,33,1st year,2,2 sem,1,2nd Sem,29,2sem,1,3rd Sem,40,4th sem,9,5th sem,28,6th sem,19,7th sem,8,8th sem,6,About BEU,1,ABOUT MAKAUT,1,aku civil Notes,15,Aku EE/EC Notes,14,aku ME Notes,14,aku notes,45,aku papers,11,aku syllabus,6,All Branch,2,all semester,19,B pharm,1,BAU Question Papers,1,BCA Notes,1,BEU Collage,12,BEU Model Paper Question,3,BEU Notes,10,BEU Organizer,31,BEU Previous Year Questions,2,Beu pyq,4,BEU PYQ Ans,5,BEU syllabus,8,Blogs,1,Btech results,1,Civil Branch,2,Civil Engineering,8,CS Engineering,8,CSE Branch,1,CSE Notes,19,Developing Soft Skills And Personality,13,EC Engineering,10,EE Branch,2,EE Engineering,9,engineering chemistry,5,Gate,1,internship,3,Introduction To Internet Of Things,21,Introduction To Machine Learning,2,iot,1,MAKAUT CE Organizer,6,MAKAUT CSE Organizer,5,MAKAUT ECE Organizer,3,MAKAUT EE Organizer,2,MAKAUT ME Organizer,4,MAKAUT Notes,5,MAKAUT Organizer,8,MAKAUT Question Paper,1,MAKAUT Syllabus,1,make money,6,ME Engineering,19,NPTEL,92,NPTEL COURSE,91,Programming Tutorial,12,Public Speaking,22,PYQ Solution,4,Question Bank,19,Soft Skills,33,Traffic & SEO,9,week 1,7,week 10,3,week 11,3,week 12,3,week 2,10,week 3,6,week 4,7,week 5,5,week 6,4,week 7,4,week 8,4,week 9,3,WEEK1,4,WEEK10,3,WEEK11,3,WEEK12,3,WEEK2,5,WEEK3,6,WEEK4,6,WEEK5,5,WEEK6,3,WEEK7,4,WEEK9,1,ztest,6,
ltr
item
BEU BIHAR : BEU PYQ , Beu previous year question All Courses All Semester Solutions: NPTEL Cyber Security and Privacy Week 2 Assignment Answers 2024 (July-October)
NPTEL Cyber Security and Privacy Week 2 Assignment Answers 2024 (July-October)
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6K6ZJXAmP52-XY5dKgIDZT5guvrh0bI1dhzQDvnic7YcU3NEObZcVsf9wu8ANTNs-rKvXklN2LKnIUlxhyvkThfyEwdq5yn5AgdDASKnCZl3uTbFMxLrB3KMXj0hJpAHf1lWT_Miyq5Bzxn27BQsuhraFYR7G9Kuj3mxntNdhchXw22ujKo0bVxisaxvf/w640-h640/th%20(18).jpg
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6K6ZJXAmP52-XY5dKgIDZT5guvrh0bI1dhzQDvnic7YcU3NEObZcVsf9wu8ANTNs-rKvXklN2LKnIUlxhyvkThfyEwdq5yn5AgdDASKnCZl3uTbFMxLrB3KMXj0hJpAHf1lWT_Miyq5Bzxn27BQsuhraFYR7G9Kuj3mxntNdhchXw22ujKo0bVxisaxvf/s72-w640-c-h640/th%20(18).jpg
BEU BIHAR : BEU PYQ , Beu previous year question All Courses All Semester Solutions
https://www.beubihar.org.in/2024/07/nptel-cyber-security-and-privacy-week-2.html
https://www.beubihar.org.in/
https://www.beubihar.org.in/
https://www.beubihar.org.in/2024/07/nptel-cyber-security-and-privacy-week-2.html
true
8161375692651428750
UTF-8
Loaded All Posts Not found any posts VIEW ALL Read More Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content
×