Is Question Bank
Is Question Bank
DEPARTMENT OF
COMPUTER SCIENCE AND
ENGINEERING
QUESTION BANK
VIII SEMESTER
IT 8073`-INFORMATION SECURITY
Regulation – 2017
Prepared by
Mr.G.RAJASEKARAN,Assistant Professor/CSE
PODHIGAI COLLEGE OF ENGINEERING AND
TECHNOLOGY
Salem Main Road, Adiyur, Tirupattur– 635 601
QUESTION BANK
(5)
13 Analyze thecritical characteristics of information. How are they used in (13)
the study of computer security?
14 Discuss the steps common to both the systems development life cycle (13)
and the security systems life cycle.
PART –C
1 Assess the importance of infrastructure protection (assuring the security
of utility services) and how that is related to the enhancement of information
security?
2 Formulate anymethodology, why it important in the implementation of
information security? How does a methodology improve the process?
3 Generalizewhich members of an organization are involved in the security
system development life cycle? Who leads the process?
4 Evaluatewho decides how and when data in an organization will be used
or controlled? Who is responsible for seeing that these wishes are carried out
UNIT -2 / PART-A
1 Show with the help of pointsthe 4 important functions for an organization (2)
based on the information security.
2 Analyzethe assets in the organization that requires protection. (2)
3 Constructwith the help of a table any 4 threats with its examples. (2)
4 Examine the meaning of the sentence“data in motion and data at rest”. (2)
5 Whatis meant by the term “Information Extortion”? (2)
6 Give the definition of software piracy. (2)
7 Illustratethe technical mechanisms that have been used to enforce (2)
copyright laws.
8 Analyzethe major differences between a Threat and an Attack. (2)
9 Express the logic behind using a licence agreement window and the use (2)
of online registration process to combat piracy.
10 Discuss about malware. (2)
11 Namethe most common methods of virus transmission. (2)
12 Formulatewhich management groups are responsible for implementing (2)
information security to protect the organization’s ability to function.
13 Evaluate the measures that individuals can take to protect themselves (2)
from shoulder surfing.
14 Definethe meaning of theterm‘Electronic Theft’. (2)
15 Express about the password attacks. (2)
16 Stateare the various types of malware? How do worms differ from (2)
viruses? Do Trojan horses carry viruses or worms?
17 Interpretthe following terms: Macro Virus & Boot Virus. (2)
18 Analyseabout commonplace security principles. (2)
19 List any five attacks that is used against controlled systems. (2)
20 Whatis the difference between a denial-of-service attack and a distributed (2)
denial-of-service attack? Which is more dangerous? Why?
PART - B (2)
1 i).Discussabout the threats. (6)
ii).Expressabout five criterias for a policy to become enforcebale.
(7)
2 Illustrate the methods does a social engineering hacker use to gain information
(13)
about a user’s login id and password? How would this method differ if it were
targeted towards an administrator’s assistant
versus a data-entry clerk?
3 Describe about the types of Laws and Ethics in Information Security. (13)
4 How will you developmanagement groups that are responsible for
implementing information security to protect the organization’s ability to (13)
function ?
5 i) Statethe types of password attacks. (6)
ii)Tell the three ways in which an authorization can be handled.
(7)
6 i) Expressin detail about : (2)
(2)
(a) Protecting the functionality of an organization
(2)
(b) Enabling the safe operations of Applications (2)
(5)
(c) Protecting data that organizations collect and use
(d) Safeguarding Technology Assets in organizations
ii)Discuss in detail about worms.
7 Analyzein detail about Ethics and Information Security. (13)
8 i)Examinein detailabout Access control list. (8)
ii)Givean example of Systems-specific policy. (5)
9 i) List the Computer Security Hybrid Policies. (7)
(6)
ii) Describethe types of Computer Security.
10 i) Quote the confidentiality policies. (7)
ii) Discussin detail about the types of security policies. (6)
11 i) ExplainIntegrity Policies. (6)
(7)
ii) Assessthe Secure Software Development.
12 Analyze whether information security a management problem? What can (13)
management do that technology cannot?
13 Pointout why data the most important asset an organization possesses? (13)
What other assets in the organization require protection?
14 Illustrate which management groups are responsible for implementing
information security to protect the organization’s ability to function. (13)
PART - C
1 How has the perception of the hacker changed over recent years?
(15)
Compose the profile of a hacker today.
Evaluate which management groups are responsible for implementing (15)