NPTEL Cyber Security and Privacy Week 8 Assignment Answers 2024

Sanket
By Sanket

NPTEL Cyber Security and Privacy Week 8 Assignment Answers 2024

1. The Cost-Benefit Analysis (CBA) formula for risk management decisions is given by:

  • CBA = ALE(prior) – ALE(post) – ACS
  • CBA = ALE(prior) – ALE(post) + ACS
  • CBA = ALE(prior) + ALE(post) – ACS
  • CBA = ALE(prior) + ALE(post) + ACS
Answer :- For Answers Click Here 

2. In a cost-benefit analysis, ________________is the expected percentage of loss that would occur from a particular attack

  • Single Loss Expectancy
  • Exposure Factor
  • Annualized Loss Expectancy
  • None of the above
Answer :- For Answers Click Here 

3. A __ is a network security device that monitors traffic to or from a network and decides whether to allow or block specific traffic based on a defined set of security rules.

  • Intrusion Detection and Prevention System
  • Router
  • Intrusion Detection System
  • Firewall
Answer :- 

4.What risk management approach aims to minimize the impact of losses resulting from an actual incident, disaster, or attack by implementing thorough contingency plans and preparations?

  • Mitigation risk control strategy
  • Transference risk control strategy
  • Defense risk control strategy
  • Termination risk control strategy
Answer :- 

5. The product of the asset’s value and the exposure factor is known as:

  • Single Loss Expectancy
  • Annualized Loss Expectancy (Prior)
  • Annualized Rate of Occurrence
  • Annualized Loss Expectancy (Post)
Answer :- For Answers Click Here 

6.Which of the following is not true?

  • Bit Stream ciphers encrypt data one bit at a time, while block ciphers encrypt data in fixed-size blocks.
  • Bit Stream Cipher is used for Data in Transit Encryption, whereas Block Cipher is used for Data at Rest Encryption
  • Bit Stream Cipher can operate as a Block CIpher but Block Cipher cannot operate as a Bit Stream Cipher
  • Bit Stream ciphers are generally considered faster than block ciphers.
Answer :- 

7. The False Acceptance Rate (FAR) in biometrics refers to:

  • The system mistakenly accepting an unauthorized user.
  • The system correctly rejecting an unauthorized user.
  • The time it takes for a system to identify a user.
  • The user’s frustration with the authentication process
Answer :- For Answers Click Here 

8. The IAAA framework in the context of access control stands for?

  • Isolation, Authentication, Authorization, Availability
  • Identification, Authentication, Authorization, Accountability
  • Inspection, Authentication, Access, Authorization
  • Intrusion Detection, Analysis, Authorization, Administration
Answer :- 

9. What is a significant challenge associated with symmetric key encryption?

  • Slower encryption and decryption compared to asymmetric methods.
  • Limited compatibility with modern encryption algorithms.
  • Higher computational cost for key generation.
  • Key management: securely distributing and safeguarding the shared key.
Answer :- 

10. In risk management, which equation is used to calculate the expected loss per risk?

  • Single Loss Expectancy (SLE) = Asset Value × Exposure Factor (EF)
  • Annualized Loss Expectancy (ALE) = Single Loss Expectancy (SLE) × Annualized Rate of Occurrence (ARO)
  • Asset Value = Single Loss Expectancy (SLE) × Exposure Factor (EF)
  • Annualized Rate of Occurrence (ARO) = Asset Value × Single Loss Expectancy (SLE)
Answer :- For Answers Click Here 
Share This Article
Leave a comment