0% found this document useful (0 votes)
28 views10 pages

Nis Papers Practise

The document consists of multiple sets of question papers focused on various aspects of information security, including topics like computer security, cryptography, intrusion detection systems, and compliance standards. Each set contains questions that require students to explain concepts, differentiate between terms, and discuss security mechanisms and protocols. The questions are structured to assess knowledge on both theoretical and practical applications in cybersecurity.

Uploaded by

gujaranusha362
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views10 pages

Nis Papers Practise

The document consists of multiple sets of question papers focused on various aspects of information security, including topics like computer security, cryptography, intrusion detection systems, and compliance standards. Each set contains questions that require students to explain concepts, differentiate between terms, and discuss security mechanisms and protocols. The questions are structured to assess knowledge on both theoretical and practical applications in cybersecurity.

Uploaded by

gujaranusha362
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Question Paper Set 1

Q1. (Attempt any five out of seven) [10 Marks]


1. Define computer security. Why is it important?
2. Explain confidentiality, integrity, and availability in information security.
3. What are viruses? Describe different types of viruses.
4. What is the purpose of biometric authentication? Explain with examples.
5. Explain Kerberos authentication protocol with its components.
6. Differentiate between symmetric and asymmetric cryptography.
7. What is cyberstalking? How can it be prevented?

Q2. (Attempt any three out of four) [12 Marks]


1. Explain firewall configurations and their functions.
2. Discuss different password attack techniques.
3. Explain DES algorithm with an example.
4. Compare DAC, MAC, and RBAC access control policies.

Q3. (Attempt any three out of four) [12 Marks]


1. Explain different types of cryptographic attacks.
2. Explain public key infrastructure (PKI) and its components.
3. Discuss email security mechanisms like PGP and PEM.
4. Differentiate between active and passive attacks with examples.

Q4. (Attempt any three out of four) [12 Marks]


1. What is an intrusion detection system (IDS)? Explain network-based IDS.
2. Explain different types of firewalls with examples.
3. Describe the X.509 certificate format.
4. What are the compliance standards for information security? Explain ISO 27001.

Q5. (Attempt any two out of three) [12 Marks]


1. Explain how Kerberos works in network security.
2. What are digital signatures? How do they ensure security?
3. Explain the ITIL framework and its role in compliance standards.

Q6. (Attempt any two out of three) [12 Marks]


1. Explain IP security protocols (AH and ESP) and their modes.
2. Discuss various types of cybercrimes with examples.
3. What is the role of the DMZ in network security?
Question Paper Set 2

Q1. (Attempt any five out of seven) [10 Marks]


1. What is information classification? Explain its importance.
2. Explain any two principles of information security.
3. What are sniffing and spoofing attacks?
4. Describe the different types of password attacks.
5. Explain the working of the Simple Columnar Transposition cipher.
6. What is the difference between stateful packet filtering and application gateway
firewalls?
7. Discuss the role of BS 25999 in compliance standards.

Q2. (Attempt any three out of four) [12 Marks]


1. Describe the need and importance of operating system security updates.
2. Explain the concept of digital forgery and its impact.
3. What is cryptanalysis? Explain its significance in cryptography.
4. Compare symmetric and asymmetric encryption.

Q3. (Attempt any three out of four) [12 Marks]


1. Explain how biometrics improve user authentication.
2. Discuss different cyber laws and their role in cybersecurity.
3. What is an anomaly-based IDS? How does it work?
4. Explain IPsec transport and tunnel modes.

Q4. (Attempt any three out of four) [12 Marks]


1. Explain different types of cryptographic hash functions.
2. What is a denial-of-service attack? How can it be prevented?
3. Describe the process of steganography with an example.
4. Compare network-based and host-based IDS.

Q5. (Attempt any two out of three) [12 Marks]


1. Describe the structure and working of an access control mechanism.
2. Explain the COBIT framework in compliance standards.
3. Discuss the security vulnerabilities of social engineering attacks.

Q6. (Attempt any two out of three) [12 Marks]


1. Explain the working of the Pretty Good Privacy (PGP) protocol in email security.
2. Describe the different phases of a virus.
3. What is a replay attack? How can it be prevented?
Question Paper Set 3

Q1. (Attempt any five out of seven) [10 Marks]


1. Define risk, threat, and vulnerability in information security.
2. Explain the need for an operating system update.
3. What is a Trojan horse? How does it affect security?
4. Describe the process of guessing passwords and its prevention.
5. What are the advantages and disadvantages of biometrics?
6. Explain digital signatures and their significance in cryptography.
7. What are honeypots? How do they help in network security?

Q2. (Attempt any three out of four) [12 Marks]


1. Differentiate between DAC, MAC, and RBAC access control models.
2. Explain the working of Kerberos authentication.
3. What is an application gateway firewall? How does it work?
4. Describe the SMTP protocol in email security.

Q3. (Attempt any three out of four) [12 Marks]


1. What is the role of cryptography in cybersecurity? Explain with examples.
2. Explain symmetric encryption and its advantages.
3. What are sniffing and spoofing attacks? How can they be prevented?
4. Describe the working of an intrusion detection system (IDS).

Q4. (Attempt any three out of four) [12 Marks]


1. What is the difference between active and passive attacks?
2. Explain the concept of non-repudiation in information security.
3. Describe different types of cybercrimes and their punishments.
4. What is the difference between a service pack and a hotfix in OS security?

Q5. (Attempt any two out of three) [12 Marks]


1. Describe the X.509 certificate format in public key infrastructure (PKI).
2. Explain the ITIL framework in compliance standards.
3. What is a denial-of-service (DoS) attack? How can it be prevented?

Q6. (Attempt any two out of three) [12 Marks]


1. Explain the ESP and AH protocols in IP security.
2. What is dumpster diving in cybersecurity? How can it be mitigated?
3. Describe the COBIT framework in information security.
Question Paper Set 4

Q1. (Attempt any five out of seven) [10 Marks]


1. Define information security. What are its basic principles?
2. Explain different types of access control policies.
3. What is phishing? How does it affect cybersecurity?
4. Differentiate between encryption and decryption.
5. What are the different types of firewalls?
6. Describe different types of biometric authentication methods.
7. What are social engineering attacks? How can they be prevented?

Q2. (Attempt any three out of four) [12 Marks]


1. Explain the concept of authentication and authorization in security.
2. Describe the difference between symmetric and asymmetric cryptography.
3. What are digital certificates? How do they work in PKI?
4. Explain the importance of compliance standards in cybersecurity.

Q3. (Attempt any three out of four) [12 Marks]


1. Explain the working of the RSA encryption algorithm.
2. What is the role of Kerberos in authentication?
3. Describe different types of network security threats.
4. Explain different types of intrusion detection systems.

Q4. (Attempt any three out of four) [12 Marks]


1. What are the different types of cybercrimes? Provide examples.
2. Explain the working of the Pretty Good Privacy (PGP) protocol.
3. Describe different types of cyber laws and their significance.
4. What is a honeypot? How does it help in intrusion detection?

Q5. (Attempt any two out of three) [12 Marks]


1. Explain the concept of email security and its different protocols.
2. What are the major compliance standards in cybersecurity?
3. Describe the role of VPNs in network security.

Q6. (Attempt any two out of three) [12 Marks]


1. Explain the different types of virus attacks.
2. What is a cyber forensic investigation? Explain its importance.
3. How does a firewall protect a network?
Question Paper Set 5

Q1. (Attempt any five out of seven) [10 Marks]


1. Define computer security. Why is it important?
2. Explain confidentiality, integrity, and availability in security.
3. What are sniffing and spoofing attacks?
4. Explain the role of biometrics in authentication.
5. Differentiate between symmetric and asymmetric cryptography.
6. What is an intrusion detection system (IDS)? Explain its working.
7. Describe the different types of access control mechanisms.

Q2. (Attempt any three out of four) [12 Marks]


1. Explain firewall configurations and their importance.
2. Discuss different password attack techniques.
3. Explain digital signatures and their role in security.
4. Compare DAC, MAC, and RBAC access control policies.

Q3. (Attempt any three out of four) [12 Marks]


1. Explain the difference between active and passive attacks.
2. Describe the process of steganography with an example.
3. Explain cryptanalysis and its impact on cryptography.
4. What is the role of PKI in cybersecurity?

Q4. (Attempt any three out of four) [12 Marks]


1. What are cyber laws? Explain their importance.
2. Describe the structure of the ITIL framework.
3. Explain different types of cryptographic attacks.
4. What is email security? Explain its working.

Q5. (Attempt any two out of three) [12 Marks]


1. Describe the X.509 certificate format in PKI.
2. What is the role of the COBIT framework in security compliance?
3. Explain the different security measures for wireless networks.

Q6. (Attempt any two out of three) [12 Marks]


1. Explain the difference between a firewall and an IDS.
2. What is a denial-of-service (DoS) attack? How can it be mitigated?
3. Discuss different methods of social engineering attacks.
Question Paper Set 6

Q1. (Attempt any five out of seven) [10 Marks]


1. What are the fundamental principles of information security?
2. Explain the concept of non-repudiation in cybersecurity.
3. What is the role of authentication in security? Provide examples.
4. Define phishing. How can it be prevented?
5. Differentiate between transport mode and tunnel mode in IPsec.
6. Explain the concept of steganography with an example.
7. What are compliance standards in information security? Explain ISO 27001.

Q2. (Attempt any three out of four) [12 Marks]


1. Explain the working of the DES encryption algorithm.
2. Describe different types of access control policies.
3. How do intrusion detection systems (IDS) enhance security?
4. Explain the importance of email security and discuss PGP.

Q3. (Attempt any three out of four) [12 Marks]


1. What is the difference between a virus, worm, and Trojan horse?
2. Explain the role of firewalls in network security.
3. How does a digital certificate work in public key infrastructure (PKI)?
4. What is the role of an authentication server in Kerberos?

Q4. (Attempt any three out of four) [12 Marks]


1. Define social engineering. How do attackers exploit it?
2. Explain different cryptographic attacks.
3. Describe the structure of an X.509 certificate.
4. What is network-based IDS? How does it detect intrusions?

Q5. (Attempt any two out of three) [12 Marks]


1. Discuss the importance of security updates for operating systems.
2. How does the COBIT framework help in IT governance?
3. Describe different password attack techniques.

Q6. (Attempt any two out of three) [12 Marks]


1. What is a denial-of-service (DoS) attack? Explain with examples.
2. How does a biometric authentication system work?
3. What is cyberstalking? How can it be prevented?
Question Paper Set 7

Q1. (Attempt any five out of seven) [10 Marks]


1. What is an intrusion detection system (IDS)? How does it work?
2. Define information classification and its importance.
3. What are digital signatures? How do they enhance security?
4. Differentiate between symmetric and asymmetric cryptography.
5. What is a replay attack? How can it be prevented?
6. Explain the different types of cybercrimes.
7. What is a firewall? Explain its role in network security.

Q2. (Attempt any three out of four) [12 Marks]


1. Explain Kerberos authentication protocol in detail.
2. How do hackers exploit buffer overflow vulnerabilities?
3. Explain the role of encryption in data security.
4. What are the compliance standards for cybersecurity?

Q3. (Attempt any three out of four) [12 Marks]


1. Explain the different types of biometric authentication.
2. What is email security? Explain SMTP, PGP, and PEM.
3. Describe the differences between authentication and authorization.
4. How do hackers conduct SQL injection attacks?

Q4. (Attempt any three out of four) [12 Marks]


1. Explain the structure of the ITIL framework in security compliance.
2. Differentiate between stateful packet filtering and circuit gateway firewalls.
3. What are common vulnerabilities in web applications?
4. Describe how digital certificates work.

Q5. (Attempt any two out of three) [12 Marks]


1. How does a VPN enhance network security?
2. Explain the importance of the BS 25999 standard in business continuity.
3. What is cyber espionage? How can organizations prevent it?

Q6. (Attempt any two out of three) [12 Marks]


1. What is IPsec? Explain its two main protocols.
2. Discuss the importance of security awareness training.
3. Explain the difference between host-based and network-based IDS.
Question Paper Set 8

Q1. (Attempt any five out of seven) [10 Marks]


1. What are the key principles of cybersecurity?
2. Explain the phases of a virus infection.
3. What is the role of PKI in authentication?
4. Explain the role of DMZ in network security.
5. What is dumpster diving in cybersecurity?
6. How does an attacker perform a man-in-the-middle attack?
7. Define cryptography and its significance in security.

Q2. (Attempt any three out of four) [12 Marks]


1. Describe different types of firewall configurations.
2. Explain how multi-factor authentication enhances security.
3. How does the Pretty Good Privacy (PGP) protocol work?
4. Explain the ITIL and COBIT frameworks in compliance.

Q3. (Attempt any three out of four) [12 Marks]


1. What is Kerberos? Explain its working process.
2. Differentiate between active and passive attacks.
3. What are different techniques of cryptanalysis?
4. How does email security help in preventing phishing attacks?

Q4. (Attempt any three out of four) [12 Marks]


1. Explain the concept of certificate authorities in PKI.
2. What are honeypots? How do they help detect attackers?
3. Discuss the role of authentication servers in cybersecurity.
4. Explain ISO 20000 compliance standards.

Q5. (Attempt any two out of three) [12 Marks]


1. How does encryption help secure data transmission?
2. What is an intrusion prevention system (IPS)? How is it different from IDS?
3. Explain the impact of cyber terrorism.

Q6. (Attempt any two out of three) [12 Marks]


1. How does cryptographic hashing ensure data integrity?
2. Describe the process of steganography with an example.
3. What are different types of cyber laws and their impact?
Question Paper Set 9

Q1. (Attempt any five out of seven) [10 Marks]


1. Define computer security and explain its need.
2. What is the role of ISO 27001 in security compliance?
3. Differentiate between vulnerability and risk.
4. How do attackers exploit weak passwords?
5. Explain the role of an application gateway firewall.
6. What are steganographic techniques?
7. How does an organization handle a cyber-attack incident?

Q2. (Attempt any three out of four) [12 Marks]


1. How do intrusion detection systems help organizations?
2. Explain the use of authentication mechanisms in security.
3. Describe the concept of digital signatures.
4. What are the different types of cybercrimes?

Q3. (Attempt any three out of four) [12 Marks]


1. Explain the role of an access control list (ACL).
2. How does public key cryptography work?
3. Describe the function of an anomaly-based IDS.
4. Explain the importance of cyber laws.

Q4. (Attempt any three out of four) [12 Marks]


1. What are different techniques of cryptanalysis?
2. Explain digital forgery and its consequences.
3. Describe the role of email security in cybersecurity.
4. How does social engineering affect organizations?

Q5. (Attempt any two out of three) [12 Marks]


1. What is a honeynet? How does it help in cybersecurity?
2. Explain the working of a VPN.
3. How does a firewall prevent cyber threats?

Q6. (Attempt any two out of three) [12 Marks]


1. What are the key features of the BS 25999 compliance standard?
2. Describe the difference between symmetric and asymmetric cryptography.
3. Explain the different types of IPsec modes.
Question Paper Set 10

Q1. (Attempt any five out of seven) [10 Marks]


1. What is meant by data confidentiality? How is it ensured?
2. Explain the different types of malware.
3. What are the essential features of an intrusion prevention system (IPS)?
4. Define access control. How is role-based access control (RBAC) implemented?
5. What are the differences between authentication and encryption?
6. How does a circuit-level gateway firewall work?
7. Explain the concept of ISO 20000 in cybersecurity compliance.

Q2. (Attempt any three out of four) [12 Marks]


1. Explain how Kerberos provides secure authentication.
2. Differentiate between stateful and stateless packet filtering.
3. What are the different cyber laws related to identity theft?
4. How does the ITIL framework improve information security?

Q3. (Attempt any three out of four) [12 Marks]


1. What is public key infrastructure (PKI)? Explain its components.
2. How do attackers exploit weak authentication mechanisms?
3. Explain digital signatures and their role in cybersecurity.
4. How do firewalls enhance network security?

Q4. (Attempt any three out of four) [12 Marks]


1. Explain different password attack techniques and how they can be prevented.
2. What is a honeypot? Explain its use in cybersecurity.
3. Describe the different modes of IPsec.
4. How does the COBIT framework contribute to security management?

Q5. (Attempt any two out of three) [12 Marks]


1. Explain the difference between a symmetric and an asymmetric encryption algorithm.
2. What is cyber forensics? How does it help in cybersecurity investigations?
3. Explain the working of Pretty Good Privacy (PGP) in email security.

Q6. (Attempt any two out of three) [12 Marks]


1. What are the risks associated with social engineering attacks? How can they be
mitigated?
2. Explain the role of cryptography in data security.
3. How do intrusion detection and prevention systems (IDPS) help organizations?

You might also like