Cyber Security Important Questions
Unit-I
Long:
- Objectives of cyber security
- Explain cyber threats ?Explain Various types of cyber threats?
- What is the need of Comprehensive security policy?
- Roles and responsibilities of system administrator?
- Define cyber security safeguards? Explain access controls?
- Explain Bio metric authentication and bio metric technique?
- Explain about intrusion detection systems IDS?
- Explain a) System Administration b) Internet Governance
- Complex network architecture?
Short:
- Nodal authority
- Software vulnerability
- Weak authentication
- Security audit
- Firewall
- Cryptography
Unit-II
Long
- Basic Security mechanism of HTTP Application and Services?
- Soap
- Identity management?
- Authorization Patterns?
- Security Considerations?
- Explain a. Open authentication b. Open ID
Short
- Explain message authentication
- Message confidentiality
- Message integrity
- Web services
- Vulnerability assessment
Unit-III
Long:
- What is intrusion ? Explain types of Intrusion?
- What is Malware? Explain types of Malware?
- Intrusion Detection & prevention techniques?
- Explain NIDS(Network Intrusion Detection system)
- Explain security information management system?
Short
- a. Physical theft b) abuse of privilege?
- Outsider ?outsider technique?
- NIPS
- HIPS
- Explain Network session analysis & session data
- Session integration validation
Unit-IV
Long
- What is Cryptography ? Explain Symmetric key cryptography? Advantages ,Disadvantages?
- Explain Asymmetric cryptography
- Message authentication ?List out approaches used ?
- Digital Signature ?Explain methods for creating and verifying digital signatures?
- Explain Algorithms related to it?
- Firewall? Types of Firewall?
- Explain a) PGP? B)IPSec with neat diagram
Short
- Explain Hash function
- MAC(Message Authentication code)
- Application of cryptography?
- Define SSL,VPN,MIME
Unit-V
Long
- Define cyber space ? Discuss its regulations?
- Discuss some cyber attacks?
- International laws?
- Cyber security standards?
- Discuss National cyber security policy 2013?
- Incident life cycle phases
- Data hiding techniques?
- What are the various steps to handle preliminary investigation?
- Explain Investigation information hiding techniques?
- How an investigation can be controlled?
Short
- Define cyber space , Network forensics, steganography
- Various cyber acts?
- Discuss Cyber attacks
- Define Cyber Forensics?
- Role of International Laws?
No comments:
Post a Comment