NPTEL Cyber Security and Privacy Week 8 Assignment Answers 2024
1. The Cost-Benefit Analysis (CBA) formula for risk management decisions is given by:
- CBA = ALE(prior) – ALE(post) – ACS
- CBA = ALE(prior) – ALE(post) + ACS
- CBA = ALE(prior) + ALE(post) – ACS
- CBA = ALE(prior) + ALE(post) + ACS
Answer :- For Answers Click Here
2. In a cost-benefit analysis, ________________is the expected percentage of loss that would occur from a particular attack
- Single Loss Expectancy
- Exposure Factor
- Annualized Loss Expectancy
- None of the above
Answer :- For Answers Click Here
3. A __ is a network security device that monitors traffic to or from a network and decides whether to allow or block specific traffic based on a defined set of security rules.
- Intrusion Detection and Prevention System
- Router
- Intrusion Detection System
- Firewall
Answer :-
4.What risk management approach aims to minimize the impact of losses resulting from an actual incident, disaster, or attack by implementing thorough contingency plans and preparations?
- Mitigation risk control strategy
- Transference risk control strategy
- Defense risk control strategy
- Termination risk control strategy
Answer :-
5. The product of the asset’s value and the exposure factor is known as:
- Single Loss Expectancy
- Annualized Loss Expectancy (Prior)
- Annualized Rate of Occurrence
- Annualized Loss Expectancy (Post)
Answer :- For Answers Click Here
6.Which of the following is not true?
- Bit Stream ciphers encrypt data one bit at a time, while block ciphers encrypt data in fixed-size blocks.
- Bit Stream Cipher is used for Data in Transit Encryption, whereas Block Cipher is used for Data at Rest Encryption
- Bit Stream Cipher can operate as a Block CIpher but Block Cipher cannot operate as a Bit Stream Cipher
- Bit Stream ciphers are generally considered faster than block ciphers.
Answer :-
7. The False Acceptance Rate (FAR) in biometrics refers to:
- The system mistakenly accepting an unauthorized user.
- The system correctly rejecting an unauthorized user.
- The time it takes for a system to identify a user.
- The user’s frustration with the authentication process
Answer :- For Answers Click Here
8. The IAAA framework in the context of access control stands for?
- Isolation, Authentication, Authorization, Availability
- Identification, Authentication, Authorization, Accountability
- Inspection, Authentication, Access, Authorization
- Intrusion Detection, Analysis, Authorization, Administration
Answer :-
9. What is a significant challenge associated with symmetric key encryption?
- Slower encryption and decryption compared to asymmetric methods.
- Limited compatibility with modern encryption algorithms.
- Higher computational cost for key generation.
- Key management: securely distributing and safeguarding the shared key.
Answer :-
10. In risk management, which equation is used to calculate the expected loss per risk?
- Single Loss Expectancy (SLE) = Asset Value × Exposure Factor (EF)
- Annualized Loss Expectancy (ALE) = Single Loss Expectancy (SLE) × Annualized Rate of Occurrence (ARO)
- Asset Value = Single Loss Expectancy (SLE) × Exposure Factor (EF)
- Annualized Rate of Occurrence (ARO) = Asset Value × Single Loss Expectancy (SLE)
Answer :- For Answers Click Here