Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Khwaja Fareed

University of Engineering &


Information Technology
Rahim Yar Khan

Department: Computer Science


Program: BSCS
Fall 2021 End Semester Exam Question Paper

COSC- 3102- Information Security: Institute: Govt. Graduate College Khanpur


Total Marks: 15 Weightage: 30%

Time Allowed: 15 minutes Exam date:

Q 1: Select the correct option from the given multiple choices. (1 * 15 = 15 Marks)
1. Who is the father of computer security?
a) August Kerckhoffs b) Bob Thomas c) Robert d) Charles
2. Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or
their associated information?
a) Cyber attack b) Computer security c) Cryptography d) Digital hacking
3. Which of the following is a type of cyber security?
a) Cloud Security b) Network Security c) Application Security d) All
4. What are the features of cyber security?
a) Compliance b) Defense against internal threats c) Threat Prevention d) All
5. Which of the following is an objective of network security?
a) Confidentiality b) Integrity c) Availability d) All
6. Which of the following is not a cybercrime?
a) Denial of Service b) Man in the Middle c) Malware d) AES
7. Which of the following is a component of cyber security?
a) Internet Of Things b) AI c) Database d) Attacks
8. Which of the following is a type of cyber attack?
a) Phishing b) SQL Injections c) Password Attack d) All
9 Which of the following act violates cyber security?
a) Exploit b) Attack c) Threat d) Vulnerability
10. Which of the following actions compromise cyber security?
a) Vulnerability b) Attack c) Threat d) Exploit
11. From the options below, which of them is not a threat to information security?
a) Disaster b) Eavesdropping c) Information leakage d) default password
12. _____ platforms are used for safety and protection of information in the cloud.
a) Cloud protection platforms b) Cloud security protocols c) AWS d) One Drive
13. Compromising confidential information comes under _________
a) Bug b) Threat c) Vulnerability d) Attack
14. Lack of access control policy is a _____________
a) Bug b) Threat c) Vulnerability d) Attack
15. Possible threat to any information cannot be ________________
a) reduced b) transferred c) protected d) ignored

Page 1 of 2
Khwaja Fareed
University of Engineering &
Information Technology
Rahim Yar Khan

Department: Computer Science


Program: BSCS
Fall 2021 End Semester Exam Question Paper
COSC- 3114-3102- Information Security: Institute: Govt. Graduate College Khanpur

Total Marks: 35 Weightage: 70%

Time Allowed: 1 Hour 55 Exam date:


Minutes

Q 2: Answer the following short questions. (03 x 05 = 15 Marks)


i. What are the major differences between Privacy & Anonymity?
ii. What is Cybercrime?
iii. What are three advantages data encryption?
iv. What is Intrusion Detection System?
v. What is digital signature?

Q 3 Answer the following Long Question. (10 * 2 = 20 Marks)

I. What is risk Management? Explain the complete process of handling Risk.


II. Differentiate between Firewall and Anti-virus.

Page 2 of 2
Khwaja Fareed
University of Engineering &
Information Technology
Rahim Yar Khan

Q1: MCQS Answer Key


1) a 2) a 3) d 4) d 5) d

6) d 7) a 8) d 9) b 10) c

11) a 12) a 13) b 14) c 15) d

Page 3 of 2

You might also like