NPTEL Cyber Security and Privacy Week 10 Assignment Answers 2024
1. Privacy Paradox is:
- The discrepancy between the expressed concern and the actual behavior of users when it comes to privacy in an online environment.
- The balance between privacy protection and data sharing in online environments.
- The phenomenon where individuals prioritize convenience over privacy
- The psychological phenomenon where individuals are unaware of the impact of their online behavior on their privacy
Answer :- For Answers Click Here
2. Which of the following is not an approach to pseudonymization?
- Masking
- Tokenization
- Hashing
- None of the above
Answer :- For Answers Click Here
3. Which of the statements about pseudonymization is not true?
- Pseudonymization is a technique proposed by frameworks like Privacy by Design offering practical substitutes for using the raw data, especially when this data is sensitive.
- Various pseudonymization techniques enable you to preserve format or understand the original intention for that data
- Pseudonymization methods often maintain the capability to establish connections between data, which proves beneficial when linking datasets using personal identifiers or other sensitive columns.
- None of the above
Answer :- For Answers Click Here
4. Externalization of restricted, but accurate information to a specific entity is known as:
- Anonymity
- Secrecy
- Confidentiality
- Security
Answer :-
5. Differential privacy is:
- A method of probabilistically limiting the amount of information an attacker can gain when data is released.
- A method for measuring and monitoring the loss of privacy experienced by an individual in a dataset that has been released.
- One of the most effective methods for providing individuals in a dataset with plausible deniability while still performing data analysis
- All the above
Answer :-
6. Which regulatory framework evolved into the General Data Protection Regulation (GDPR) in 2018?
- FTC privacy principles
- APEC privacy framework
- OECD Guidelines
- EU Data Protection Directive
Answer :- For Answers Click Here
7. In the context of privacy, what does the acronym “FIPP” stand for?
- Freedom of Information Processing Practices
- Fair Information Practice Principles
- Federal Internet Privacy Protections
- Financial Information Protection Protocols
Answer :-
8. Which of the following statements is true?
- Quasi Identifiers are more valuable for targeted advertising than Identifiers
- Identifiers are always anonymized, whereas Quasi-Identifiers are non-anonymized.
- Identifiers are not considered personal data whereas Quasi Identifiers are.
- Identifiers can uniquely identify an individual, while quasi-identifiers cannot on their own.
Answer :-
9. What are the two techniques used in k-anonymization?
- Randomization and suppression
- Generalization and encryption
- Suppression and generalization
- Suppression and encryption
Answer :-
10. What does the optimal point on an R-U map represent?
- Complete elimination of all data privacy risks,by fully anonymizing all data
- Utilizing all PIIs data, extracting full value without privacy concerns
- Maximizing data usefulness while maintaining acceptable privacy risks.
- None of the above
Answer :- For Answers Click Here