Skip to content

EasyExamNotes.com

  • Home
  • Tutorial
  • Interview Q&A
  • Video Lectures
  • PYQs
  • MCQ
Menu

EasyExamNotes.com

  • Home
  • Tutorial
  • Interview Q&A
  • Video Lectures
  • PYQs
  • MCQ
Menu

Cyber Security PYQ

How can we defend zero-day vulnerabilities ?

February 13, 2024February 3, 2024 by By Team EasyExamNotes

Understand What Zero-Day Vulnerabilities Are: Awareness and Quick Response: Developing and Applying Patches: Vendor’s Mitigation Advice: Rapid Deployment of Fixes: User Education: Monitoring and Detection … Read more

Write a short note on marketplace for vulnerabilities.

February 13, 2024February 3, 2024 by By Team EasyExamNotes

In the complex landscape of consumer choices, a segment of vulnerable consumers often struggles to discern their preferences due to a lack of understanding, skills, … Read more

Differentiate between active and passive attack.

February 13, 2024February 3, 2024 by By Team EasyExamNotes

Comparison Basis Active Attack Passive Attack Task Performed Attempts to change system resources or affect operation Attempts to read or make use of information from … Read more

Write short note on server-side attack and insider attack.

February 13, 2024February 3, 2024 by By Team EasyExamNotes

Server-side attack: Server-side attacks are like sneaky intrusions where an outsider (the attacker) tries to mess with a server directly. The goal is to break … Read more

Discuss various attacks in computer security.

February 13, 2024February 3, 2024 by By Team EasyExamNotes

Various attacks in computer security: Malware: Macro Viruses: File Infectors: System or Boot-Record Infectors: Stealth Viruses: Trojans: Logic Bombs: Worms: Droppers: Ransomware: Denial of Service … Read more

What are the components of security policy ?

February 13, 2024February 3, 2024 by By Team EasyExamNotes

Following are the components of security policy:

Discuss the security mechanism used to provide security in computer system.

February 13, 2024February 2, 2024 by By Team EasyExamNotes

Security mechanisms used to provide security in computer system are: Encipherment: Data Integrity: Digital Signature: Authentication Exchange: Traffic Padding: Routing Control: Notarization:

What are the advantages and disadvantages of Biba Model ?

February 13, 2024February 2, 2024 by By Team EasyExamNotes

Advantages: Disadvantages:

Discuss different security models in details.

February 13, 2024February 2, 2024 by By Team EasyExamNotes

Bell -LaPadula Model (BLP): a. Purpose: b. Description: c. Key Point: Biba Model: a. Purpose: b. Description: c. Key Point: Brewer and Nash Model (Chinese … Read more

Write short note on security policy used for computer systems.

February 13, 2024February 2, 2024 by By Team EasyExamNotes

General Policies: Server Policies: Firewall Access and Configuration Policies: Backup Policies: VPN Policies:

Older posts
Newer posts
← Previous Page1 Page2 Page3 Next →

© 2024 EasyExamNotes.com | Some content on this site was generated with the assistance of Google's Gemini AI and ChatGPT.