NPTEL Cyber Security and Privacy Week 6 Assignment Answers 2024

Sanket
By Sanket

NPTEL Cyber Security and Privacy Week 6 Assignment Answers 2024

1. A determination of the extent to which an organization’s information assets are exposed to risk is known as:

  • Risk identification
  • Risk control
  • Risk assessment
  • Risk Management
Answer :- For Answers Click Here 

2. _______is the risk to information assets that remains even after current controls have been applied.

  • Risk appetite
  • Residual risk
  • Inherent risk
  • Contingency risk
Answer :- For Answers Click Here 

3. Which of these is not a component of risk identification?

  • Plan & organize the process
  • Classify, value, & prioritize assets
  • Specify asset vulnerabilities
  • Determine loss frequency
Answer :- For Answers Click Here 

4. The likelihood of an attack together with the attack frequency to determine the expected number of losses within a specified time range is known as:

  • Loss frequency
  • Attack success probability
  • Loss magnitude
  • Risk
Answer :- 

5. _______is an information attack that involves searching through a target organization’s trash for sensitive information.

  • Shoulder surfing
  • Network sniffing
  • Dumpster diving
  • Watering hole attacks
Answer :- 

6. Risk management in cyber security involves three key steps. These steps are:

  • Monitoring, auditing, and reporting.
  • Identifying risks, assessing risk, and controlling risks.
  • Training employees, patching vulnerabilities, and using firewalls.
  • Investigating incidents, recovering data, and learning lessons.
Answer :- For Answers Click Here 

7. The “attack surface” in cyber security is a visualization tool that helps to understand:

  • The effectiveness of different security tools.
  • The relationship between various types of threats and the organization’s assets.
  • The complexity of the organization’s network infrastructure.
  • The cost of implementing different security controls.
Answer :- 

8. During the Risk Identification phase, assets are classified into which of the following categories?

  • Financial assets, Intellectual property, and Human resources
  • Assets, Liabilities, and Equity
  • Tangible assets, Intangible assets, and Fixed assets
  • People, Procedures, Data and information, Software, Hardware, and Networking elements
Answer :- 

9. Which formula accurately represents the calculation of risk in cyber security risk assessment?

  • Risk = Loss frequency + Loss magnitude
  • Risk = Loss frequency x Loss magnitude + Measurement Uncertainty
  • Risk = (% Risk Mitigated by Controls) / (Loss Frequency x Loss Magnitude)
  • Risk = Loss frequency – Loss magnitude + Measurement Uncertainty
Answer :- 

10. You are a security analyst for a company that manages an online store with a customer database. Industry reports indicate a 10 percent chance of an attack this year, based on an estimate of one attack every 10 years. A successful attack could result in the theft of customer data. There is a 20% chance of the threat being able to materialize and achieve its objectives even in place of robust secure protection mechanisms. The customer database is most valued being an e-commerce company at 90 in a 1-100 scale. The IT department informed that 60% of the assets will be exposed after a successful attack. The estimation of measurements is 80% accurate. Calculate the risk associated to the asset with a potential SQL injection attack.

  • 3.756
  • 4.196
  • 3.276
  • 1.296
Answer :- For Answers Click Here 
Share This Article
Leave a comment