Question Bank-InfoSec
Question Bank-InfoSec
IT -Sem2
Subject: Emerging Technologies in Computing
Question on Information Security (unit-5)
1. What is information security, and why is it important for individuals and organizations?
2. What are some common threats to information security?
3. Explain the concept of confidentiality, integrity, and availability (CIA) in information security.
4. What is encryption, and how does it contribute to information security?
5. What is a firewall, and how does it protect a network?
6. What are some best practices for creating strong passwords?
7. What are the key differences between a vulnerability, an exploit, and a patch in the context of
information security?
8. Describe the role of a virtual private network (VPN) in securing communications over the
internet.
9. Discuss the importance of regular security awareness training for employees in organizations.
10. Explain best practices that need to be developed for creating a data security mindset.
11. What are some emerging trends or technologies in information security, and how might they
impact the future landscape of cybersecurity?
12. What is phishing, and how can individuals and organizations protect themselves against
phishing attacks?
13. Explain the concept of multi-factor authentication and its role in enhancing security.
14. Discuss the importance of regular security awareness training for employees in organizations.
15. What is ransomware, and how can organizations defend against ransomware attacks?
16. Discuss the concept of security by design and its significance in developing secure software
and systems.
17. What is the difference between data at rest and data in transit, and how can each be secured
effectively?
18. What are some emerging threats in information security, such as AI-driven attacks or supply
chain vulnerabilities, and how can organizations prepare to defend against them? (An assignment
Question).
19. Describe the concept of a honeypot and its role in detecting and studying malicious activities
within a network.
20. Describe the concept of threat intelligence and its relevance in proactively identifying and
mitigating security threats.
21. Explain information in terms of Network, Software and Devices.
22. Explain with example DDoS, Man-in-middle and Zero-day Exploits attacks or threats.
23. Explain Authentication and Authorization with examples.
24. Explain the importance of Digital Signature while keeping security aspects in mind.
25. Which are the security features provided by Google in their mail functionality.