Advanced Diploma
Advanced Diploma
No:
11. (a) (i) Explain any 4 Knowledge Areas (KA) that are followed in industry to
8
avoid security compromises.
(ii) Draw the network security model and discuss about its components. 8
(OR)
(b) (i) Discuss about CIA triad and elaborate how it is used in securing the
8
data of an organization.
(ii) Explain the types of attacks and its mitigation strategies. 8
1
12. (a) (i) Clipkart is a popular online shopping company that would like to
extend its service across India. The company is planning to develop
an online platform and looking for developers. Assume yourself as a 8
security expert and provide the security considerations required for
building the application.
(ii) Prepare a mitigation plan for the above scenario and discuss its
8
merits.
(OR)
(b) (i) ABC is a e - newspaper company that would like to invest in an
offline software that can be used to prepare its e-content. Assume
yourself as a security expert and provide the security considerations 8
required for building the offline application.
[NOTE: Consider Linux & Windows as the preferred OS]
(ii) Prepare a risk management plan for the above scenario and discuss its
8
merits.
13. (a) (i) Explain the process of audit in terms of security and list out its
8
outcomes
(ii) Elaborate the types of smart cards and provide a suitable example
8
where smart card outperforms other mechanisms.
(OR)
(b) (i) Explain the best practices that are recommended in the view of
8
passwords and list out its drawback over PIN
(ii) Elaborate the necessity of certificates in the online applications. 8
14. (a) (i) What is CER and how it is calculated? Discuss about the errors and
8
its influence in the overall efficiency of the system.
(ii) Elucidate the difference between the types of access control. 8
(OR)
(b) (i) Explain the concept of firewall and how it protects the information
8
with a suitable example of your choice.
(ii) Elaborate the necessity of security policies and its impact. 8
**********************************