Professional Documents
Culture Documents
Assignment 2 SWL
Assignment 2 SWL
SET-1
Q1.The concept of network virtualization has been highly evolved now. Comment.
Q3. Computer systems are prone to various cyber security vulnerabilities. Is it any
standardized description for each vulnerability? Are there any possible ways?
SET-2
Q1. The security threats in the system can pose a threat to the data. Comment.
Q2. Cyberwar attacks the systems and networks in warfare. Comment. When does it begin
or end?
Q3. Hub and switch both are network devices. How they are differentiated from each
other?
Q4. I just used a command and got completely different results from the last time I used it.
Why
SET-3
Q1. Identifying, assessing and managing business risks How effective is our process for?
Q3. Is there a way to use one command to start more than one program at a time?
SET-4
Q1. I can’t seem to log in, even though I’m using the correct password. What’s wrong
SET-5
Q1. Is there an easy way to see what devices, such as drives, have been mounted
Q2. Your data is not safe on the internet. Support this statement with appropriate
examples.
Q3. My Clients Are Getting The Error Message That The Disk Is Full When Trying To Print To My Sam
Plenty Of Space. What Is The Problem?
Q4. List the various ways that can tell if our system has been compromised.
SET-6
Q1. Do you think having a HTTPS makes you secure? Intricate into the same.
Q3. Repeaters and routers both are network devices. How they are differentiated from
each other.
Q4. Your data is not safe on the internet. Support this statement with appropriate
examples.
SET-7
Q1. We need to secure our E-mail. List down the necessary measures needed.
Q3. If you don’t have a proper system monitoring on your system, what may possibly
go wrong with you?
Q4.Threats or vulnerabilities, Which one is more important for cyber security
professionals to focus on.?
SET-8
Q1. The security threats in the system can pose a threat to the data. Comment.
Q2. Cyberwar attacks the systems and networks in warfare. Comment. When does it begin
or end?
Q3. Hub and switch both are network devices. How they are differentiated from each
other?
SET-9
Q2. I can’t seem to log in, even though I’m using the correct password. What’s wrong
SET-10
Q1.Repeaters and routers both are network devices. How they are differentiated from each
other.
Q2. Computer systems are prone to various cyber security vulnerabilities. Is it any
standardized description for each vulnerability? Are there any possible ways?
SET-11
Q1Web browsers such as Internet Explorer, Firefox and Chrome also display a padlock
icon in the address bar to visually indicate that a HTTPS connection is in effect. How you
can setup HTTPS connection and also Compare HTTP with HTTPS.
SET-12
Q1. Identifying, assessing and managing business risks How effective is our process for?
Q2. Repeaters and routers both are network devices. How they are differentiated from
each other.