NPTEL Cyber Security and Privacy Week 10 Assignment Answers 2024

Sanket
By Sanket

NPTEL Cyber Security and Privacy Week 10 Assignment Answers 2024

1. Privacy Paradox is:

  • The discrepancy between the expressed concern and the actual behavior of users when it comes to privacy in an online environment.
  • The balance between privacy protection and data sharing in online environments.
  • The phenomenon where individuals prioritize convenience over privacy
  • The psychological phenomenon where individuals are unaware of the impact of their online behavior on their privacy
Answer :- For Answers Click Here 

2. Which of the following is not an approach to pseudonymization?

  • Masking
  • Tokenization
  • Hashing
  • None of the above
Answer :- For Answers Click Here 

3. Which of the statements about pseudonymization is not true?

  • Pseudonymization is a technique proposed by frameworks like Privacy by Design offering practical substitutes for using the raw data, especially when this data is sensitive.
  • Various pseudonymization techniques enable you to preserve format or understand the original intention for that data
  • Pseudonymization methods often maintain the capability to establish connections between data, which proves beneficial when linking datasets using personal identifiers or other sensitive columns.
  • None of the above
Answer :- For Answers Click Here 

4. Externalization of restricted, but accurate information to a specific entity is known as:

  • Anonymity
  • Secrecy
  • Confidentiality
  • Security
Answer :- 

5. Differential privacy is:

  • A method of probabilistically limiting the amount of information an attacker can gain when data is released.
  • A method for measuring and monitoring the loss of privacy experienced by an individual in a dataset that has been released.
  • One of the most effective methods for providing individuals in a dataset with plausible deniability while still performing data analysis
  • All the above
Answer :- 

6. Which regulatory framework evolved into the General Data Protection Regulation (GDPR) in 2018?

  • FTC privacy principles
  • APEC privacy framework
  • OECD Guidelines
  • EU Data Protection Directive
Answer :- For Answers Click Here 

7. In the context of privacy, what does the acronym “FIPP” stand for?

  • Freedom of Information Processing Practices
  • Fair Information Practice Principles
  • Federal Internet Privacy Protections
  • Financial Information Protection Protocols
Answer :- 

8. Which of the following statements is true?

  • Quasi Identifiers are more valuable for targeted advertising than Identifiers
  • Identifiers are always anonymized, whereas Quasi-Identifiers are non-anonymized.
  • Identifiers are not considered personal data whereas Quasi Identifiers are.
  • Identifiers can uniquely identify an individual, while quasi-identifiers cannot on their own.
Answer :- 

9. What are the two techniques used in k-anonymization?

  • Randomization and suppression
  • Generalization and encryption
  • Suppression and generalization
  • Suppression and encryption
Answer :- 

10. What does the optimal point on an R-U map represent?

  • Complete elimination of all data privacy risks,by fully anonymizing all data
  • Utilizing all PIIs data, extracting full value without privacy concerns
  • Maximizing data usefulness while maintaining acceptable privacy risks.
  • None of the above
Answer :- For Answers Click Here 
Share This Article
Leave a comment