Need help with this week’s assignment? Get detailed and trusted solutions for Cyber Security and Privacy Week 5 NPTEL Assignment Answers. Our expert-curated answers help you solve your assignments faster while deepening your conceptual clarity.
✅ Subject: Cyber Security and Privacy
📅 Week: 5
🎯 Session: NPTEL 2025 July-October
🔗 Course Link: Click Here
🔍 Reliability: Verified and expert-reviewed answers
📌 Trusted By: 5000+ Students
For complete and in-depth solutions to all weekly assignments, check out 👉 NPTEL Cyber Security and Privacy Week 5 Assignment Answers
🚀 Stay ahead in your NPTEL journey with fresh, updated solutions every week!
NPTEL Cyber Security and Privacy Week 5 Assignment Answers 2025
1. Which of the following statement is not true?
- Policies direct how issues should be addressed and technologies should be used.
- Information security policy is best disseminated in a comprehensive security education, training, and awareness (SETA) program.
- Policies are more detailed than standards and describe the steps that must be taken to conform to standards.
- Management must use policies as the basis for all information security planning, design, and deployment.
Answer : See Answers
2. ________ is an organizational policy that provides detailed, targeted guidance to instruct all members of the organization in the use of a resource, such as one of its processes or technologies.
- Systems-specific security policy
- Issue-specific security policy
- Enterprise information security policy
- General or security program policy
Answer :
3. Which of the following is not a component of Enterprise information security policy?
- Statement of Purpose
- Information Security Responsibilities and Roles
- Reference to other Information Standards and Guidelines
- Statement of Policy
Answer :
4. ____________ contains the specifications of authorization that govern the rights and privileges of users to a particular information asset.
- Access Control List (ACL)
- Capabilities Table
- Configuration Rules
- Authentication Protocol
Answer :
5. Access Control Matrix combines the information in
- Access Control List (ACL)s and Capability Tables.
- Access Control List (ACL)s and Authentication Protocol.
- Authentication Protocol and Capability Tables.
- Configuration Rules and Capability Tables.
Answer :
6. Which of the following best differentiates cyber hygiene from cybersecurity?
- Cyber hygiene is hardware-focused, while cybersecurity is software-focused.
- Cyber hygiene is reactive in nature, while cybersecurity is always proactive.
- Cyber hygiene involves routine practices for maintaining digital health, whereas cybersecurity includes broader strategies, technologies, and incident response.
- Cyber hygiene focuses only on personal devices, while cybersecurity is limited to organizations.
Answer : See Answers
7. True or False: Configuration rules govern how a security system reacts to the data it receives.
- True
- False
Answer :
8. Which of the following is not true about Systems-Specific Security Policies (SysSPs)?
- SysSPs can be separated into two general groups, managerial guidance SysSPs and technical specifications SysSPs.
- SysSPs function as standards or procedures to be used when configuring or maintaining systems.
- SysSPs can be combined into a single policy document that contains elements of both managerial guidance SysSPs and technical specifications SysSPs.
- SysSPs can be developed at the same time as Issue-specific policies (ISSPs), or they can be prepared after their related ISSPs.
Answer :
9. Which of the following are the basic rules that should be followed when shaping a policy?
- Never conflict with law
- Properly supported and administered
- Involve end users of information systems
- All the above
Answer :
10. The statement “Use strong passwords, frequently changed.” is an example of
- Practice
- Standard
- Guideline
- Policy
Answer : See Answers


