Cyber Security and Privacy Week 4 NPTEL Assignment Answers 2025

Need help with this week’s assignment? Get detailed and trusted solutions for Cyber Security and Privacy Week 4 NPTEL Assignment Answers. Our expert-curated answers help you solve your assignments faster while deepening your conceptual clarity.

✅ Subject: Cyber Security and Privacy
📅 Week: 4
🎯 Session: NPTEL 2025 July-October
🔗 Course Link: Click Here
🔍 Reliability: Verified and expert-reviewed answers
📌 Trusted By: 5000+ Students

For complete and in-depth solutions to all weekly assignments, check out 👉 NPTEL Cyber Security and Privacy Week 4 Assignment Answers

🚀 Stay ahead in your NPTEL journey with fresh, updated solutions every week!

NPTEL Cyber Security and Privacy Week 4 Assignment Answers 2025

1. ___ is the actions taken by management to specify the intermediate goals and objectives of the organization in order to obtain specified strategic goals, followed by estimates and schedules for the allocation of resources necessary to achieve those goals and objectives.

  • Tactical Planning
  • Strategic Planning
  • Operational Planning
  • Business Continuity Planning
Answer : See Answers

2. True or False: Strategic plans are used to create operational plans, which in turn are used to develop tactical plans.

  • True
  • False
Answer :

3. The actions taken by senior management to develop and implement a combined Disaster Recovery (DR) and Business Continuity (BC) policy, plan, and set of recovery teams is known as

  • Business Resumption Planning (BRP)
  • Business Continuity Planning (BCP)
  • Disaster Recovery Planning (DCP)
  • Incident Response Planning (IRP)
Answer :

4. ______________ is an adverse event that could result in loss of an information asset or assets, but does not currently threaten the viability of the entire organization.

  • Disaster
  • Phishing
  • Incident
  • Impact
Answer :

5. Contingency Plan includes

  • Incident Response Planning (IRP), Organizational Planning (OP), and Business Continuity Planning (BCP)
  • Organizational Planning (OP), Disaster Recovery Planning (DRP), and Business Continuity Planning (BCP)
  • Incident Response Planning (IRP), Disaster Recovery Planning (DRP), and Tactical Planning (TP)
  • Incident Response Planning (IRP), Disaster Recovery Planning (DRP), and Business Continuity Planning (BCP)
Answer :

6. ________ is an investigation and assessment of adverse events that can affect the organization, conducted as a preliminary phase of the contingency planning process.

  • Business Contingency Plan
  • Direct Changeover Conversion Strategy
  • Crisis Management Planning
  • Business Impact Analysis
Answer : See Answers

7. ____________ is the total amount of time the system owner is willing to accept for a mission/business process outage or disruption, including all impact considerations.

  • Recovery Time Objective
  • Work Recovery Time
  • Maximum Tolerable Downtime
  • Total Recovery Time
Answer :

8. The presence or execution of unknown programs or processes is a

  • Possible incident indicator
  • Probable incident indicator
  • Definite incident indicator
  • All the above
Answer :

9. An organization can choose from several cost-based strategies when planning for business continuity. _______is a facility that provides only basic services, with no computer hardware or peripherals.

  • Hot Sites
  • Warm Sites
  • Cold Sites
  • Yellow Sites
Answer :

10. Which of the following statements accurately distinguish between a threat and an attack in cybersecurity? (Select all that apply. More than one answer may be possible)

  • A threat is a potential danger, while an attack is an active action taken to exploit that danger
  • An attack can exist without a preceding threat
  • A threat actor often carries out an attack
  • An attack’s success always depends on the existence of a vulnerability that the threat agent can exploit
Answer : See Answers