Hello learners In this article we are going to discuss NPTEL Cyber Security and Privacy Assignment 3 Answers. All the Answers provided below to help the students as a reference, You must submit your assignment with your own knowledge and use this article as reference only.
About the course:-
For an autonomous agent to behave in an intelligent manner it must be able to solve problems. This means it should be able to arrive at decisions that transform a given situation into a desired or goal situation. The agent should be able to imagine the consequence of its decisions to be able to identify the ones that work. In this first course on AI we study a wide variety of search methods that agents can employ for problem solving.
Assignment No. | Answers |
---|---|
Cyber Security and Privacy Assignment 1 | Click Here |
Cyber Security and Privacy Assignment 2 | Click Here |
Cyber Security and Privacy Assignment 3 | Click Here |
Cyber Security and Privacy Assignment 4 | Click Here |
Cyber Security and Privacy Assignment 5 | Click Here |
Cyber Security and Privacy Assignment 6 | Click Here |
Cyber Security and Privacy Assignment 7 | Click Here |
Cyber Security and Privacy Assignment 8 | Click Here |
Cyber Security and Privacy Assignment 9 | Click Here |
Cyber Security and Privacy Assignment 10 | Click Here |
Cyber Security and Privacy Assignment 11 | Click Here |
Cyber Security and Privacy Assignment 12 | Click Here |
NPTEL Cyber Security and Privacy Assignment 3 Answers 2023:
1. Which of the following terms best describe the specification of a model to be followed during the design, selection, and initial and ongoing implementation of all subsequent security controls?
- Blueprint
- NIST handbook
- An information security framework
- Security plan
Answer :- Will update answers soon and update on our telegram channel so Join Click Here
2. True or False: SP 800-18, Guide for Developing Security Plans, is considered the foundation for a comprehensive security blueprint and framework.
- True
- False
Answer :-
3. One of the foundations of security architectures is the requirement to implement security in layers. This layered approach is referred to as:
- managerial controls
- security domain
- redundancy
- defense in depth
Answer :-
Next Week Answers: Assignment 04
4. Control Objectives for Information and Related Technologies is a framework created by —— for information technology (IT) management and ————-
- HIPPA, & Information officer
- ISO, & Security officer
- ISACA, & IT governance
- CISO, & Chief officer
Answer :-
5. Three approaches to cyber security management are
- Governance-Risk-Compliance (GRC) approach
- —————————————————
- Organizational planning approach
- Information-driven approach
- Security-driven approach
- Standards-driven approach
- Procedure-driven approach
Answer :-
6. ISO/IEC 27032:2012 involves guidelines for —————–
- Network security
- Cyber security
- Risk Management
- Governance of information security
Answer :-
7. The five goals of information security governance are
- —————–of information security with business strategy to support organizational objectives
- —————- by executing appropriate measures to manage and mitigate threats to information resources
- —————–by utilizing information security knowledge and infrastructure efficiently and effectively
- —————–by measuring, monitoring, and reporting information security governance metrics to ensure that organizational objectives are achieved
- —————–by optimizing information security investments in support of organizational objectives.
A. Strategic alignment
B. Risk management
C. Resource management
D. Performance measurement
E. Value delivery
- 1-B,2-C,3-D,4-C,5-A,
- 1-C,2-B,3-A,4-B,5-E
- 1-E,2-C,3-A,4-B,5-D
- 1-A,2-B,3-C,4-D,5-E,
Answer :-
8. Match ISO Series with the corresponding topic
(A) 27000 (1)Series Overview and Terminology
(B) 27003 (2)Information Security Management Systems Implementation Guidelines
(C) 27004 (3) Information Security Measurements and Metrics
(D) 27005 (4) ISMS Risk Management
(E) 27006 (5) Requirements for Bodies Providing Audit and Certification of ISMS
- A-1, B-2,C-3, D-4, E-5
- A-4, B-2, C-3, D-1, E-5
- A-2,B-1,C-3,D-5,E-4
- A-3,B-2,C-1,D-5,E-4
Answer :-
9. (1)—————— is authorized by policy from senior management and is usually carried out by senior IT and information security executives, such as the(2)———and-(3)——-
- 1- ISG 2- CIO, 3- CISO
- 1-CO,2, 2-CIO,3- CISO
- 1-CISO, 2-CIO, 3-CO
- 1-CISO, 2-ISG, 3-CO
Answer:-