Cyber Security and Privacy Week 5 NPTEL Assignment Answers 2025

Need help with this week’s assignment? Get detailed and trusted solutions for Cyber Security and Privacy Week 5 NPTEL Assignment Answers. Our expert-curated answers help you solve your assignments faster while deepening your conceptual clarity.

✅ Subject: Cyber Security and Privacy
📅 Week: 5
🎯 Session: NPTEL 2025 July-October
🔗 Course Link: Click Here
🔍 Reliability: Verified and expert-reviewed answers
📌 Trusted By: 5000+ Students

For complete and in-depth solutions to all weekly assignments, check out 👉 NPTEL Cyber Security and Privacy Week 5 Assignment Answers

🚀 Stay ahead in your NPTEL journey with fresh, updated solutions every week!

NPTEL Cyber Security and Privacy Week 5 Assignment Answers 2025

1. Which of the following statement is not true?

  • Policies direct how issues should be addressed and technologies should be used.
  • Information security policy is best disseminated in a comprehensive security education, training, and awareness (SETA) program.
  • Policies are more detailed than standards and describe the steps that must be taken to conform to standards.
  • Management must use policies as the basis for all information security planning, design, and deployment.
Answer : See Answers

2. ________ is an organizational policy that provides detailed, targeted guidance to instruct all members of the organization in the use of a resource, such as one of its processes or technologies.

  • Systems-specific security policy
  • Issue-specific security policy
  • Enterprise information security policy
  • General or security program policy
Answer :

3. Which of the following is not a component of Enterprise information security policy?

  • Statement of Purpose
  • Information Security Responsibilities and Roles
  • Reference to other Information Standards and Guidelines
  • Statement of Policy
Answer :

4. ____________ contains the specifications of authorization that govern the rights and privileges of users to a particular information asset.

  • Access Control List (ACL)
  • Capabilities Table
  • Configuration Rules
  • Authentication Protocol
Answer :

5. Access Control Matrix combines the information in

  • Access Control List (ACL)s and Capability Tables.
  • Access Control List (ACL)s and Authentication Protocol.
  • Authentication Protocol and Capability Tables.
  • Configuration Rules and Capability Tables.
Answer :

6. Which of the following best differentiates cyber hygiene from cybersecurity?

  • Cyber hygiene is hardware-focused, while cybersecurity is software-focused.
  • Cyber hygiene is reactive in nature, while cybersecurity is always proactive.
  • Cyber hygiene involves routine practices for maintaining digital health, whereas cybersecurity includes broader strategies, technologies, and incident response.
  • Cyber hygiene focuses only on personal devices, while cybersecurity is limited to organizations.
Answer : See Answers

7. True or False: Configuration rules govern how a security system reacts to the data it receives.

  • True
  • False
Answer :

8. Which of the following is not true about Systems-Specific Security Policies (SysSPs)?

  • SysSPs can be separated into two general groups, managerial guidance SysSPs and technical specifications SysSPs.
  • SysSPs function as standards or procedures to be used when configuring or maintaining systems.
  • SysSPs can be combined into a single policy document that contains elements of both managerial guidance SysSPs and technical specifications SysSPs.
  • SysSPs can be developed at the same time as Issue-specific policies (ISSPs), or they can be prepared after their related ISSPs.
Answer :

9. Which of the following are the basic rules that should be followed when shaping a policy?

  • Never conflict with law
  • Properly supported and administered
  • Involve end users of information systems
  • All the above
Answer :

10. The statement “Use strong passwords, frequently changed.” is an example of

  • Practice
  • Standard
  • Guideline
  • Policy
Answer :  See Answers