Skip to content

EasyExamNotes.com

  • Home
  • Tutorial
  • Interview Q&A
  • Video Lectures
  • PYQs
  • MCQ
Menu

EasyExamNotes.com

  • Home
  • Tutorial
  • Interview Q&A
  • Video Lectures
  • PYQs
  • MCQ
Menu

Cyber Security PYQ

Give a short summary of IP protocol functions.

February 13, 2024February 8, 2024 by By Team EasyExamNotes

Addressing: Data Encapsulation and Formatting/Packaging: Fragmentation and Reassembly:

Explain the advantages and disadvantages of in TCP/IP model.

February 13, 2024February 8, 2024 by By Team EasyExamNotes

Advantages: Disadvantages:

Define internet infrastructure. What are different internet infrastructures ?

February 13, 2024February 8, 2024 by By Team EasyExamNotes

Defination: Internet infrastructure refers to the physical components, transmission mediums, and software that facilitate the connection of computers and users on the Internet. It plays … Read more

Write short note on secret key cryptography. Also list its advantages, disadvantages and examples.

February 13, 2024February 8, 2024 by By Team EasyExamNotes

Secret Key Cryptography: Secret key cryptography, also known as symmetric key cryptography, is a cryptographic system that uses the same key for both the encryption … Read more

What is DES ? Why were double and triple DES created and what are they ?

February 13, 2024February 7, 2024 by By Team EasyExamNotes

DES, or Data Encryption Standard, is a symmetric cryptosystem that uses a 64-bit block size and a 56-bit key for encryption. It operates as a … Read more

Explain SSL encryption. What are the steps involved inSSL server authentication ?

February 13, 2024February 7, 2024 by By Team EasyExamNotes

SSL Encryption: Purpose: SSL (Secure Sockets Layer) is like a secret code for the internet. It keeps your information safe by encrypting it, making sure … Read more

Discuss measures against DNS attacks.

February 13, 2024February 7, 2024 by By Team EasyExamNotes

Measures against DNS attacks : Digital Signatures and Certificates: Regular Software Updates (Using BIND): Installing Patches and Fixing Bugs: Data Replication in Multiple Servers: Blocking … Read more

Explain the DNS security threats.

February 13, 2024February 7, 2024 by By Team EasyExamNotes

Common DNS security threats are : Distributed Denial of Service (DDoS): DNS Spoofing (or DNS Cache Poisoning): Fast Flux: Reflected Attacks: Reflective Amplification DoS:

How DNS security works ?

February 13, 2024February 7, 2024 by By Team EasyExamNotes

Basic Function of DNS: Unique Identifiers (IP Addresses): IP addresses are like unique phone numbers for each website or computer. They help computers locate and … Read more

Describe briefly Domain Name Server (DNS).

February 13, 2024February 7, 2024 by By Team EasyExamNotes

What is DNS? DNS, or Domain Name Server, is like a giant phone book for the internet. Its main job is to convert easy-to-remember names … Read more

Older posts
Newer posts
← Previous Page1 Page2 Page3 Page4 … Page15 Next →

© 2024 EasyExamNotes.com | Some content on this site was generated with the assistance of Google's Gemini AI and ChatGPT.