NPTEL Cyber Security and Privacy Week 5 Assignment Answers 2024

Sanket
By Sanket

NPTEL Cyber Security and Privacy Week 5 Assignment Answers 2024

1. The primary function of a cybersecurity policy within an organization is to:

  • Define a rigid set of penalties for security violations.
  • Eliminate the need for ongoing security awareness training programs.
  • Dictate specific technical security controls for implementation.
  • Establish a comprehensive reference point for organizational cybersecurity practices.
Answer :- For Answers Click Here 

2. Which type of policy is related to an organization’s strategic purpose, mission, and vision?

  • Issue-specific information security policies (ISSP)
  • Systems-specific information security policies (SysSP)
  • Enterprise information security policy (EISP)
  • Technical implementation policy
Answer :- For Answers Click Here 

3. True or False: Standards are broad, abstract documents that provide detailed procedures for employees to comply with policies.

  • True
  • False
Answer :- For Answers Click Here 

4. Which of the following reflects the hierarchical top-down order of information security policies?

  • Enterprise > Issue-Specific > Systems-Specific
  • Systems-Specific > Issue-Specific > Enterprise
  • Issue-Specific > Enterprise > Systems-Specific
  • All three policy types are independent and unconnect
Answer :- 

5. Which of the following components is typically included in the Enterprise Information Security Policy (EISP)?

  • Incident response procedures
  • Statement of purpose
  • Software development guidelines
  • Employee performance evaluations
Answer :- For Answers Click Here 

6. True or False: Systems-specific security policies (SysSPs) can be separated into two general groups, managerial guidance SysSPs and technical specifications SysSPs

  • True
  • False
Answer :- 

7. _____________ consists of details about user access and use permissions and privileges for an organizational asset or resource.

  • Access Control Lists
  • Configuration rules
  • Authorized access and usage of equipment
  • Authorization rules
Answer :- For Answers Click Here 

8. True or False: Consequence-driven Cyber-informed Engineering (CCE) is a cyber defense concept that focuses on the lowest consequence events from an engineering perspective so that resource-constrained organizations receive the greatest return on their security investments.

  • True
  • False
Answer :- 

9. _________ are nonmandatory recommendations the employee may use as a reference in complying with a policy.

  • Practices
  • Procedures
  • Standards
  • Guidelines
Answer :- 

10. Creating “air gaps” to isolate critical systems is a cyber hygiene practice that focuses on:

  • Installing the latest security patches.
  • Strengthening user authentication.
  • Segmenting networks for improved security
  • Keeping complex passwords up-to-date.
Answer :- For Answers Click Here 
Share This Article
Leave a comment