Skip to content

EasyExamNotes.com

  • Home
  • Tutorial
  • Interview Q&A
  • Video Lectures
  • PYQs
  • MCQ
Menu

EasyExamNotes.com

  • Home
  • Tutorial
  • Interview Q&A
  • Video Lectures
  • PYQs
  • MCQ
Menu

Cyber Security PYQ

Discuss briefly the term rootkit.

February 13, 2024February 4, 2024 by By Team EasyExamNotes

Describe the types of VM based isolation.

February 13, 2024February 4, 2024 by By Team EasyExamNotes

Following are the types of Virtual Machine based isolation : a. Process Virtual Machines: b. System Virtual Machines (Hypervisor Virtual Machines): c. Hosted Virtual Machines: … Read more

What do you understand by VM based isolation?

February 13, 2024February 4, 2024 by By Team EasyExamNotes

VM (Virtual Machine) based isolation refers to the use of virtualization technology to create isolated environments on a computer system. Isolated Environment: A VM is … Read more

Explain error 404 digital hacking in India part 2 chase.

February 13, 2024February 3, 2024 by By Team EasyExamNotes

Israel’s Power Grid Hack: Hydropower Plant Hack in Upstate New York (2014): Cyber Worm Targeting Iran’s Infrastructure: Bangladesh Best Group Hacking Indian Websites: Virus for … Read more

Discuss confinement techniques in details.

February 13, 2024February 3, 2024 by By Team EasyExamNotes

Following are the various confinement techniques :

Define SUID, SGID and sticky bits with basic difference.

February 13, 2024February 3, 2024 by By Team EasyExamNotes

There are three special permissions that are available for executablefiles and directories: Differences: Aspect SUID (Set User ID) SGID (Set Group ID) Sticky Bit Purpose … Read more

Explain basic permission bits on non-directories and directories files.

February 13, 2024February 3, 2024 by By Team EasyExamNotes

Every file and directory in our UNIX/Linux system has following threepermissions : Non-Directories (Regular Files): Directories: So, in summary:

Describe detour used in Unix user ids and process ids.

February 13, 2024February 3, 2024 by By Team EasyExamNotes

User IDs (UIDs): Types of UIDs in Processes: Subjects and Principals: Objects: User Accounts and UID 0: Mapping Users to Principals:

Describe confinement principle in brief.

February 13, 2024February 3, 2024 by By Team EasyExamNotes

The confinement principle is like a security rule that prevents a server from spilling out information that should be kept secret according to the user. … Read more

Differentiate between DAC and MAC.

February 13, 2024February 3, 2024 by By Team EasyExamNotes

Aspect DAC (Discretionary Access Control) MAC (Mandatory Access Control) 1. Type of Access Control DAC is a type of access control MAC is a type … Read more

Older posts
Newer posts
← Previous Page1 … Page10 Page11 Page12 … Page15 Next →

© 2024 EasyExamNotes.com | Some content on this site was generated with the assistance of Google's Gemini AI and ChatGPT.