63% found this document useful (8 votes)
4K views3 pages

CS205 Subjective MidTerm by Vu Topper RM

Uploaded by

asmamuslim44
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
63% found this document useful (8 votes)
4K views3 pages

CS205 Subjective MidTerm by Vu Topper RM

Uploaded by

asmamuslim44
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

CS205-Information Security

Update Important Subjective


Mid Term by Vu Topper RM

@vutopperrm

d
cc

For More Help Contact What’s app 03224021365


Very Important Topics with Question.
1) CIS and DISA.
2) stakeholders’ names.
3) Transformation layers.
4) Rule title WLAN and EAP TLS.
5) Write two characteristics of risk?
6) Explain the inside and outside attacks?
7) Explain non-repudiation with examples?
8) Write two characteristics of
Information?
9) What is business continuity
management?
10) Security hardening steps for inventory
assets.
11) Enlist any Five basic tracks of hardening
strategy?
12) Explain Cost Benefit Analysis and write
formula?

For More Help Contact What’s app 03224021365


13) What is the significant of vulnerability
management information model?
14) What is first step in automated
mechanism of security hardening validation?
15) Enlist any Five name of security services
provide by OSI security Architecture?
16) Which of the following can be
considered mistakes security hardening
improvement step?

Visit My YouTube Channel


For More Important Notes
Channel Name = #VuTopperRM

For More Help Contact What’s app 03224021365

You might also like