0% found this document useful (0 votes)
5 views2 pages

DT3 Important Questions

Uploaded by

jam.explore.1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views2 pages

DT3 Important Questions

Uploaded by

jam.explore.1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Section A: 2 Marks Questions

1. Define information security and its three core principles. (Unit 1)

2. What is phishing, and how does it pose a threat to cybersecurity? (Unit 1)

3. Define cloud computing and list any two examples of its services. (Unit 2)

4. What is the primary benefit of using a shared pool of resources in cloud computing? (Unit
2)

5. What is a blockchain, and how does it ensure immutability of data? (Unit 3)

6. State two key benefits of using blockchain for transaction tracking in business. (Unit 3)

Section B: 5 Marks Questions


1. Differentiate between symmetric and asymmetric cryptography with examples. (Unit 1)

2. Explain how ransomware works and its impact on individuals and businesses. (Unit 1)

3. Describe the security challenges associated with cloud computing. (Unit 2)

4. Discuss the concept of 'on-demand access' in cloud computing and its advantages for
businesses. (Unit 2)

5. Explain how a blockchain network facilitates better confidence and efficiency in


transactions. (Unit 3)

6. Describe the role of smart contracts in blockchain-based business networks. (Unit 3)

Section C: 10 Marks Questions


1. Discuss the various types of cyber attacks and the countermeasures to mitigate them.
(Unit 1)

2. Elaborate on the importance of cryptographic techniques in ensuring information


security. (Unit 1)

3. Evaluate the future research trends in cloud computing, focusing on scalability and
security. (Unit 2)

4. Analyze the management issues faced while implementing a cloud infrastructure in a


business. (Unit 2)

5. Discuss the structure and working of blockchain, including its components (e.g., blocks,
chains, hashing). (Unit 3)
6. Explain how blockchain technology transforms traditional business processes and its
advantages over conventional methods. (Unit 3)

You might also like