We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1
Unit 1
1. What is Framework and explain its purpose?
2. Elaborate key [phases of penetration testing. 3. Explain the layer of defense in depth. 4. Write short notes on – i. Theoritical Security models ii. Characteristics of Network Security 5. Give the case studies of risks of service security. 6. Describe the security architecture in detail. 7. Describe how Information Security and risks are interrelated. 8. What is risk quantification and what are different methods to quantify risks. 9. Explain different risk handling methods. 10. With the neat diagram explain Information security program structure. 11. Enlist pros and cons of ethical hacking and risk analysis. 12. Explain about ethical hacking components. 13. What is the importance of security policy in ethical hacking 14. What does policy structure (document) comprised of? 15. Study and write about nmap, wireshark tools.