We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3
CS205-Information Security
Update Important Subjective
Mid Term by Vu Topper RM
@vutopperrm
d cc
For More Help Contact What’s app 03224021365
Very Important Topics with Question. 1) CIS and DISA. 2) stakeholders’ names. 3) Transformation layers. 4) Rule title WLAN and EAP TLS. 5) Write two characteristics of risk? 6) Explain the inside and outside attacks? 7) Explain non-repudiation with examples? 8) Write two characteristics of Information? 9) What is business continuity management? 10) Security hardening steps for inventory assets. 11) Enlist any Five basic tracks of hardening strategy? 12) Explain Cost Benefit Analysis and write formula?
For More Help Contact What’s app 03224021365
13) What is the significant of vulnerability management information model? 14) What is first step in automated mechanism of security hardening validation? 15) Enlist any Five name of security services provide by OSI security Architecture? 16) Which of the following can be considered mistakes security hardening improvement step?
Visit My YouTube Channel
For More Important Notes Channel Name = #VuTopperRM