Skip to content

EasyExamNotes.com

  • Home
  • Tutorial
  • Interview Q&A
  • Video Lectures
  • PYQs
  • MCQ
Menu

EasyExamNotes.com

  • Home
  • Tutorial
  • Interview Q&A
  • Video Lectures
  • PYQs
  • MCQ
Menu

Cyber Security PYQ

Write short note on server-side attack and insider attack.

February 13, 2024February 3, 2024 by By Team EasyExamNotes

Server-side attack: Server-side attacks are like sneaky intrusions where an outsider (the attacker) tries to mess with a server directly. The goal is to break … Read more

Discuss various attacks in computer security.

February 13, 2024February 3, 2024 by By Team EasyExamNotes

Various attacks in computer security: Malware: Macro Viruses: File Infectors: System or Boot-Record Infectors: Stealth Viruses: Trojans: Logic Bombs: Worms: Droppers: Ransomware: Denial of Service … Read more

What are the components of security policy ?

February 13, 2024February 3, 2024 by By Team EasyExamNotes

Following are the components of security policy:

Discuss the security mechanism used to provide security in computer system.

February 13, 2024February 2, 2024 by By Team EasyExamNotes

Security mechanisms used to provide security in computer system are: Encipherment: Data Integrity: Digital Signature: Authentication Exchange: Traffic Padding: Routing Control: Notarization:

What are the advantages and disadvantages of Biba Model ?

February 13, 2024February 2, 2024 by By Team EasyExamNotes

Advantages: Disadvantages:

Discuss different security models in details.

February 13, 2024February 2, 2024 by By Team EasyExamNotes

Bell -LaPadula Model (BLP): a. Purpose: b. Description: c. Key Point: Biba Model: a. Purpose: b. Description: c. Key Point: Brewer and Nash Model (Chinese … Read more

Write short note on security policy used for computer systems.

February 13, 2024February 2, 2024 by By Team EasyExamNotes

General Policies: Server Policies: Firewall Access and Configuration Policies: Backup Policies: VPN Policies:

What are the advantages and disadvantages of computer security ?

February 13, 2024February 2, 2024 by By Team EasyExamNotes

Advantages of Computer Security: Disadvantages of Computer Security:

How can an organization protect its computer system hardware ?

February 13, 2024February 2, 2024 by By Team EasyExamNotes

Five steps to protect computer system hardware are:

Explain security measure taken to protect the system.

February 13, 2024February 2, 2024 by By Team EasyExamNotes

To protect the system, security measures can be taken has at following levels: Physical Security: Human Security: Operating System Security: Networking Security:

Older posts
Newer posts
← Previous Page1 … Page13 Page14 Page15 Next →

© 2024 EasyExamNotes.com | Some content on this site was generated with the assistance of Google's Gemini AI and ChatGPT.