Professional Documents
Culture Documents
QUE BANK PTT-1 and 2 (23-24)
QUE BANK PTT-1 and 2 (23-24)
QUE BANK PTT-1 and 2 (23-24)
(2M)
b. Define:
Risk
Vulnerability
Assets
Threat
countermeasures
(4M)
a) Explain Security Basics In Detail.
b) Define virus. Explain any six+ types of viruses
c) Differentiate between insider and intruders.
d) Differentiate between virus and worms
e) Explain active and passive attacks..
f) Explain DAC, MAC And RBAC policies.
g) Explain the mechanism of figure and voice pattern in biometrics
h) Explain sniffing and spoofing Attack
i) Explain DOS and DDOS attack
j) define following terms:
k) Operating system
l) Hot fix
m) Patch
n) Service pack
QUESTION BANK (PTT-2)
(2M)
a) Define the term plain text,ciphertext, cyptography, encryption,decryption
b) List substitution cipher technique.
c) List transposition cipher technique
d) Define Encryption and Decryption.
e) State any 2 limitations of firewall.
f) Define firewall and state types of firewall.
g) Define AS, TGS with respect to Kerberos.
h) Define Hacking. List types of hackers.
i) List component of PKI
j) Define Cybercrime And List Any Four Types
(4M)
a) Convert plaintext into cipher text by using simple columnar technique of the following
sentence
‘ALL IS WELL FOR YOUR EXAM’
i. Copyright
ii. Patent
iii. Trademark
e) Explain DMZ.
f) Explain PKI
g) Explain working of PEM with respect to email security