Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

ASSIGNMENT 2

SET-1

Q1.The concept of network virtualization has been highly evolved now. Comment.

Q2. Briefly discuss the attacks on the network or a system.

Q3. Computer systems are prone to various cyber security vulnerabilities. Is it any
standardized description for each vulnerability? Are there any possible ways?

Q4. List the damages caused by Internet vulnerabilities?

SET-2

Q1. The security threats in the system can pose a threat to the data. Comment.

Q2. Cyberwar attacks the systems and networks in warfare. Comment. When does it begin
or end?

Q3. Hub and switch both are network devices. How they are differentiated from each
other?

Q4. I just used a command and got completely different results from the last time I used it.
Why

SET-3

Q1. Identifying, assessing and managing business risks How effective is our process for?

Q2. DOS Attack is one of the biggest vulnerability. Do you Agree?

Q3. Is there a way to use one command to start more than one program at a time?

Q4. With what objectives, malicious attackers attack the system?

SET-4

Q1. I can’t seem to log in, even though I’m using the correct password. What’s wrong

Q2. Three mail security issues are? Elaborate your answer


Q3. Web browsers such as Internet Explorer, Firefox and Chrome also display a padlock
icon in the address bar to visually indicate that a HTTPS connection is in effect. How you
can setup HTTPS connection and also Compare HTTP with HTTPS.

Q4. Security measures needed to protect the system. Is it so?

SET-5

Q1. Is there an easy way to see what devices, such as drives, have been mounted

Q2. Your data is not safe on the internet. Support this statement with appropriate
examples.

Q3. My Clients Are Getting The Error Message That The Disk Is Full When Trying To Print To My Sam
Plenty Of Space. What Is The Problem?

Q4. List the various ways that can tell if our system has been compromised.

SET-6

Q1. Do you think having a HTTPS makes you secure? Intricate into the same.

Q2. Differentiate between Cron and Anacron in Windows and Linux?

Q3. Repeaters and routers both are network devices. How they are differentiated from
each other.

Q4. Your data is not safe on the internet. Support this statement with appropriate
examples.

SET-7

Q1. We need to secure our E-mail. List down the necessary measures needed.

Q2. Is there any problem with clicking unknown links?

Q3. If you don’t have a proper system monitoring on your system, what may possibly
go wrong with you?
Q4.Threats or vulnerabilities, Which one is more important for cyber security
professionals to focus on.?

SET-8

Q1. The security threats in the system can pose a threat to the data. Comment.

Q2. Cyberwar attacks the systems and networks in warfare. Comment. When does it begin
or end?

Q3. Hub and switch both are network devices. How they are differentiated from each
other?

SET-9

Q1.Differentiate between Cron and Anacron in Windows and Linux?

Q2. I can’t seem to log in, even though I’m using the correct password. What’s wrong

Q3. Three mail security issues are? Elaborate your answer

SET-10

Q1.Repeaters and routers both are network devices. How they are differentiated from each
other.

Q2. Computer systems are prone to various cyber security vulnerabilities. Is it any
standardized description for each vulnerability? Are there any possible ways?

Q3. List the damages caused by Internet vulnerabilities?

SET-11

Q1Web browsers such as Internet Explorer, Firefox and Chrome also display a padlock
icon in the address bar to visually indicate that a HTTPS connection is in effect. How you
can setup HTTPS connection and also Compare HTTP with HTTPS.

Q2. Three mail security issues are? Elaborate your answer


Q3. My Clients Are Getting The Error Message That The Disk Is Full When Trying To
Print To My Samba Server, But There Is Plenty Of Space. What Is The Problem?

SET-12

Q1. Identifying, assessing and managing business risks How effective is our process for?

Q2. Repeaters and routers both are network devices. How they are differentiated from
each other.

Q3. With what objectives, malicious attackers attack the system?

You might also like