QUE BANK PTT-1 and 2 (23-24)

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

QUESTION BANK (PTT-1)

(2M)

a. What Is Computer Security. And state its need.

b. Define:
 Risk
 Vulnerability
 Assets
 Threat
 countermeasures

c. Differentiate between virus and worms.


d. State The Types Of Attack
e. List Any Four Types Of Biometric Techniques

f. Explain The Terms :


 Shoulder Surfing
 Piggybacking
 Dumpster diving

g. Define confidentiality and accountability.


h. Define access control. list its type
i. Define virus and logic bomb.

(4M)
a) Explain Security Basics In Detail.
b) Define virus. Explain any six+ types of viruses
c) Differentiate between insider and intruders.
d) Differentiate between virus and worms
e) Explain active and passive attacks..
f) Explain DAC, MAC And RBAC policies.
g) Explain the mechanism of figure and voice pattern in biometrics
h) Explain sniffing and spoofing Attack
i) Explain DOS and DDOS attack
j) define following terms:
k) Operating system
l) Hot fix
m) Patch
n) Service pack
QUESTION BANK (PTT-2)

(2M)
a) Define the term plain text,ciphertext, cyptography, encryption,decryption
b) List substitution cipher technique.
c) List transposition cipher technique
d) Define Encryption and Decryption.
e) State any 2 limitations of firewall.
f) Define firewall and state types of firewall.
g) Define AS, TGS with respect to Kerberos.
h) Define Hacking. List types of hackers.
i) List component of PKI
j) Define Cybercrime And List Any Four Types

(4M)

a) Convert plaintext into cipher text by using simple columnar technique of the following
sentence
‘ALL IS WELL FOR YOUR EXAM’

b) Differentiate between host-based and network based IDS.(4points)


c) Compare symmetric and asymmetric key cryptography.
d) Describe following terms of intellectual property :

i. Copyright

ii. Patent

iii. Trademark

e) Explain DMZ.
f) Explain PKI
g) Explain working of PEM with respect to email security

h) Explain working of Kerberos.


i) Explain working principle of PGP.
j) List types of firewall. Explain packet filter with diagram.
k) Explain policies, limitation and configuration of firewall

You might also like