NPTEL Cyber Security and Privacy Week 4 Assignment Answers 2024

admin
By admin

NPTEL Cyber Security and Privacy Week 4 Assignment Answers 2024

1. A facility that provides only rudimentary services, with no computer hardware or peripherals is known as:

  • Cold site
  • Hot site
  • Warm site
  • Service bureau
Answer :- For Answer Click Here

2. The amount of effort necessary to make the business function operational after the technology element is recovered is known as:

  • Recovery Time Objective
  • Work Recovery Time
  • Maximum Tolerable Downtime
  • Recovery Point Objective
Answer :- For Answer Click Here

3. Contingency Planning includes:

  • Incident response plan
  • Disaster recovery plan
  • Business continuity plan
  • All the above
Answer :- 

4. An investigation and assessment of the various adverse events that can affect the organization, conducted as a preliminary phase of the contingency planning process, which includes a determination of how critical a system or set of information is to the organization’s core processes and recovery priorities is known as:

  • Risk assessment
  • Business impact analysis
  • Crisis management
  • Incident damage assessment
Answer :- For Answer Click Here

5. The process that prepares an organization to reestablish or relocate critical business operations during a disaster that affects operations at the primary site is known as:

  • Business continuity planning
  • Disaster recovery planning
  • Strategic Planning
  • Operational planning
Answer :- 

6. Which level of Organizational Planning typically addresses day-to-day activities and tasks?

  • Strategic Planning
  • Tactical Planning
  • Operational Planning
  • Top Management Planning
Answer :- 

7. The job function of the Chief Information Security Officer includes:

  • Creating a strategic information security plan with a vision for the future of information security.
  • Understanding fundamental business activities performed by the company and suggesting appropriate information security solutions that uniquely protect these activities.
  • Improving the status of information security by developing action plans, schedules, budgets, status reports and top management communications
  • All the above
Answer :- For Answer Click Here

8. What is the unit of analysis in the contingency planning approach?

  • Business Assets
  • Risk Assets
  • Business Processes
  • Risk Factors
Answer :- 

9. Which of the following is not a possible incident indicator?

  • Presence of unfamiliar files
  • Unusual consumption of computing resources
  • Unusual system crashes
  • Activities at unexpected times
Answer :- 

10. What is the purpose of conducting an After Action Review (AAR) in incident response?

  • To review and improve the effectiveness of the DRP
  • To review and improve the effectiveness of the BCP
  • To review and improve the effectiveness of the IRP
  • To notify law enforcement agencies
Answer :- For Answer Click Here
Share This Article
Leave a comment