Skip to content

EasyExamNotes.com

  • Home
  • Tutorial
  • Interview Q&A
  • Video Lectures
  • PYQs
  • MCQ
Menu

EasyExamNotes.com

  • Home
  • Tutorial
  • Interview Q&A
  • Video Lectures
  • PYQs
  • MCQ
Menu

Cyber Security PYQ

What are the advantage and disadvantages of DAC and MAC ?

February 13, 2024February 3, 2024 by By Team EasyExamNotes

Discretionary Access Control (DAC): Advantages: Disadvantages: Mandatory Access Control (MAC): Advantages: Disadvantages:

What are the problems related with MAC ?

February 13, 2024February 3, 2024 by By Team EasyExamNotes

Following are the different problems in MAC : Requirement of new security levels: a. In MAC, regular people (outside the organization) don’t have a security … Read more

Describe Mandatory Access Control (MAC).

February 13, 2024February 3, 2024 by By Team EasyExamNotes

Mandatory Access Control (MAC) is a strict type of access control used by operating systems to limit what users or devices can do with files … Read more

Explain the issues related with DAC.

February 13, 2024February 3, 2024 by By Team EasyExamNotes

Discretionary Access Control (DAC) is a security model that grants or restricts access to resources based on the identity of the user and their ownership … Read more

Explain Discretionary Access Control (DAC).

February 13, 2024February 3, 2024 by By Team EasyExamNotes

Owner’s Control: DAC is like giving someone ownership of a thing, say a computer file or a document. The person who creates the file is … Read more

What are the issues related Bell-LaPadula model?

February 13, 2024February 3, 2024 by By Team EasyExamNotes

Issues with Bell-LaPadula model :

Define and explain the term confidentiality policy.

February 13, 2024February 3, 2024 by By Team EasyExamNotes

Confidentiality Policy: A confidentiality policy is like a set of rules that focus on keeping information private and secure. Imagine it as a set of … Read more

What is Data breach ?

February 13, 2024February 3, 2024 by Team EasyExamNotes

Definition: Causes: Impact: Prevention and Response:

How can we control hijacking attack ?

February 13, 2024February 3, 2024 by By Team EasyExamNotes

Hijacking attack is controlled through : Platform Defense: 1. Fixing Bugs: 2. Marking Memory as Non-Executable: Run-time Defense: 1. Stack Integrity Testing: 2. Canaries (Random … Read more

How can we prevent format string vulnerabilities ?

February 13, 2024February 3, 2024 by By Team EasyExamNotes

Preventing format string vulnerabilities : 1.Always specify a format string as part of the program, not as an input: 2. Make the format string a … Read more

Older posts
Newer posts
← Previous Page1 … Page11 Page12 Page13 … Page15 Next →

© 2024 EasyExamNotes.com | Some content on this site was generated with the assistance of Google's Gemini AI and ChatGPT.