Dis Imp Questions
Dis Imp Questions
UNIT I - INRODUCTION
TWO MARKS
2) Name he multiple layers of security that a successful organization should have in its place to
10) Show with the help of a diagram about the components of information Security
11) How shall you design the computer as the subject and object of the attack?
14) State the responsibilities of Data Owners, Data custodians and Data users.
15) Examine if the C.I.A. triangle is incomplete, why is it so commonly used in security?
16) Describe a Security Team in an organization. Should the approach to security be technical or
Managerial?
19) Classify the three components of the C.I.A Triangle. What are they used for?
20) Information Security is which of the following: An Art or Science or both? Justify your
Answer.
BIG QUESTIONS
1) Evaluate who decides how and when data in an organization will be used or controlled? Who
4) Assess the importance of infrastructure protection (assuring the security of utility services)
5) Discuss the steps common to both the systems development life cycle and the security
6) Analyze the critical characteristics of information. How are they used in the study of computer
Security?
ii) Analyze the methodology important in the implementation of information security? How
8) What are the six components of an information system? Which are most directly affected by
SSDLC model.
12) Illustrate briefly about SDLC waterfall methodology and its relation in respect to information
Security.
13) Evaluate the various components of Information Security that a successful organization must
Have.
14) i)List the various components of an information system and tell about them.
ii).Describe in detail about the top down approach and the bottom up approach with the help
of a diagram.
TWO MARKS
1) Show with the help of points the 4 important functions for an organization based on the
Information security
3) Construct with the help of a table any 4 threats with its examples.
4) Examine the meaning of the sentence “data in motion and data at rest”.
7) Illustrate the technical mechanisms that have been used to enforce copyright laws.
12) Formulate which management groups are responsible for implementing information security
13) Evaluate the measures that individuals can take to protect themselves from shoulder surfing
16) State the various types of malware? How do worms differ from viruses? Do Trojan horses
17) Interpret the following terms: Macro Virus & Boot Virus
19) List any five attacks that is used against controlled systems.
20) What is the difference between a denial-of-service attack and a distributed denial-of-service
BIG QUESTIONS
1) How has the perception of the hacker changed over recent years? Compose the profile of a
Hacker today.
2) Evaluate which management groups are responsible for implementing information security to
5) Illustrate which management groups are responsible for implementing information security to
6) Point out why data the most important asset an organization possesses? What other assets in
7) Analyze whether information security a management problem? What can management do that
Technology cannot?
8) How will you develop management groups that are responsible for implementing information
9) Illustrate the methods does a social engineering hacker use to gain information about a user’s
Login id and password? How would this method differ if it were targeted towards an
TWO MARKS
3) List the forgeries done by attacker to break the break the digital signature
5) Given two integers A=3 and M=11, identify the modular multiplicative inverse of A under
Modulo M.
15) List the requirements that are not satisfied by version 2 of X.509 certificate.
BIG QUESTIONS
TWO MARKS
9) What is POP3?
BIG QUESTIONS
1) Explain S/MIME operational descriptions, message content types and enhanced security
Services.
4) Explain the various IPSec components with a neat architecture diagram. Also explain the
IPSec modes.
5) Explain all the fields in Authentication Header with its two modes.
TWO MARKS
9) Explain S-HTTP.
BIG QUESTIONS
ii) Explain the categories of web security threats that affects the integrity, authenticity,
4) Explain the protocols for securing internet communication, email and web transactions.
6) You are developing a mobile application where users can chat securely with one another. The
Application will send messages over the internet, and you want to ensure that these messages
remain
Private and unaltered during transit. Describe how you would apply Transport Level Security
(TLS) in
Your application to protect the messages. Discuss how the two layers of protocols in TLS
architecture