0% found this document useful (0 votes)
46 views4 pages

Imp Questions: Join - Site

Nis

Uploaded by

Sonu Roy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views4 pages

Imp Questions: Join - Site

Nis

Uploaded by

Sonu Roy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

NIS

IMP QUESTIONS

Join Our Telegram Channel to get Total Free MSBTE


Study Material
JOIN - https://t.me/campusifyy
SITE - https://www.campusify.co.in/

Downloaded From Campusify!


Chapter 1: INTRODUCTION TO COMPUTER AND INFORMATION SECURITY (CO1)

2 Marks
1. DEFINE: 1) Vulnerability 2) Threats 3) Assets 4) Counter Measures
2. What is VIRUS? List Different Phases of Viruses
3. What is Computer Security? List needs of Computer Security (any three).
4. Compare Intruders and Insiders (4 Points)
5. Define: 1) Hotfix 2) Patch
6. What is Information .Give importance of information?

4 Marks
1. List different types of viruses. Explain any two.
2. List different Types of Attacks .Explain DDOS Attack
3. Explain CIA Security Model with neat diagram.
4. List criteria for classification of Information. Explain any three.
5. Explain 1) Active Attack 2) Passive Attack.

Chapter 2 – USER AUTHENTICATION AND ACCESS CONTROLS (CO2)

2 Marks

1. Define: 1) Authentication 2) Biometrics 3) Access controls 4) Authorization


2. List and Explain password guessing strategies (Any Two).
3. Explain fingerprint in biometric.
4. Explain voice patterns in biometric.
5. Explain Signature & writing patterns in biometric.

Downloaded From Campusify!


4 Marks

1. Explain Authentication Mechanism.


2. List three types of password attack & Explain any Two.
3. Explain given access control Policies: 1) DAC 2) MAC
4. Explain Keystrokes and Handprint in biometrics

Chapter 3 – CRYPTOGRAPHY (CO3)

2 marks

1. Define: a) Cryptography b) Cryptanalysis c) Encryption d) Decryption


2. Define: a) Plain Text b) Cipher Text c) Cryptology d) Steganography
3. Convert Plain text using Caesar’s Cipher method (Shift =3). Plain Text: ABCDEFGHIJKLXYZ

4Marks

1) Explain Caesar’s Cipher method and convert given text using Caesar’s cipher (Shift =3)
Text: “Come home tomorrow”
2) Apply simple Columnar Transposition Technique for text “WELCOME COME” and
Key= ZEBRAS
3) Compare Substitution Cipher and Transposition Cipher (4 points)

Downloaded From Campusify!


Chapter 4: FIREWALL AND INTRUSION DETECTION SYSTEM (CO4)

2 Marks

1. Define firewall and list needs of firewall.


2. List firewall policies
3. What is vulnerability assessment?
4. State Anomaly detection
5. Define: Honeypots.

4 Marks

1. Explain DMZ with diagram.


2. What is IDS ? Explain Host Based IDS with diagram .
3. What is IDS ? Explain Network Based IDS with diagram .
4. List types of firewall. Explain Packet Filtering firewall with diagram.
5. List types of firewall. Explain Application Gateways firewall with diagram.
6. List types of firewall. Explain Circuit Gateways firewall with diagram.
7. List types of firewall. Explain Stateful Packet Filtering firewall with diagram.

Chapter 5 – NETWORK SECURITY, CYBER LAWS AND COMPLIANCE STANDARDS (CO5)

2 Marks

1. Define: 1) Cyber-crime 2) PKI (Public key infrastructure)


2. List needs of cyber laws.
3. What is cyber defamation?
4. Define Hacking. List types of Hackers.
5. What is Indian cyber law & list two types.

4 Marks

1. Explain SMTP.
2. List different types of cyber-crime & explain hacking.
3. Explain working of Kerberos with diagram.
4. Explain PGP.
5. Explain ITIL framework .
6. Explain IPsec security with help of diagram.

Downloaded From Campusify!

You might also like