Download as odt, pdf, or txt
Download as odt, pdf, or txt
You are on page 1of 2

APPLICATION CYBER SECURITY (CSPC-04/ CSP-13)

Q. No. 1. Answer all the questions, each within one word or one sentence. Marks: 1 × 10 = 10

a) DSA is a ______________ type of algorithm.

Ans- cryptographic algorithm


b) ____________ type of hackers uses their hacking skills for defensive purpose.

Ethical Hackers (White Hat Hackers)


c) ‘12345’ is an example of Strong Password [True/False].

false

d) _____________ is a computer program which transmits from one computer to another

computer by attaching itself to another program.

Worm

e) What does RAID stands for?

Redundant Array of Independent Disks


f) A ____________ is a documented process to recover and protect a business IT

infrastructure in the event of a disaster.

drp

g) A _____________ is a mathematical scheme for demonstrating the authenticity of digital

messages or documents.

digital signature
h) __________ encryption is a cryptographic system that uses a system of two keys.

Asymmetric cryptography
i) The _________ family of standards offers a set of specifications, codes of conduct and best

practice guidelines for organizations to ensure strong IT service management.

ISO9000

j) What does ITIL stands for?

Information Technology Infrastructure


Library
Q. No 2. Short answer-type Questions (Word Limit: 100 Words) Marks: 5 × 4 = 20
a) Explain database integrity and their types.

Data integrity is normally enforced in a database system by a series


of integrity constraints or rules. Three types of integrity constraints
are an inherent part of the relational data model: entity integrity,
referential integrity and domain integrity. Entity integrity concerns
the concept of a primary key.
Domain integrity: Domain integrity ensures the accuracy of each piece of data in a domain,
or a set of acceptable values. It may also include constraints that restrict certain types of
data.
Referential integrity: Referential integrity ensures the proper storage and use of dat

b) What are the types of unusual programming bugs?

c) Briefly explain about RAID technology.

d) What is pen testing? Briefly explain about various types of pen testing.

You might also like