You are on page 1of 2

M Tech IS

CS-554
Network Security
1st Semester (August to December 2020)
Quiz 1 October 2020
Time 40 Minutes
Marks: 2 (TWO) Each
Q1. How decreasing skills necessary to be a hacker increases the Vulnerability of Information
Resources?
Q2. What are the different threats to integrity and how to counter them?
Q3. Please justify with an example the statement “Compromises to Intellectual Property is
very important”.
Q4. What is Ping of Death attack?
Q5. What do you mean by Computational security?
Q6. The estimated computations required to crack a password of 6 characters from the 26 letter
alphabet is-------------.
Q7. Is it possible that in brute force attack, on average half of all possible keys must be tried to
achieve success? If yes, explain.
Q8. Who owns the top risks and is accountable for results, and to whom do they report?
Q9. Does the company understand the key assumptions underlying its strategy and align its
competitive intelligence process to monitor external factors for changes that could alter
those assumptions? Tell about a few major applications of cryptography in the modern
world.
Q10. Is Cryptography a legal approach or its not?
Q11. Is there A Single Risk Register That Collates All Significant Risks (strategic And Non-
strategic), With Action Plans to Mitigate Them?
Q12. What is the Acceptable Use Policy?
Q13. What do you mean by Security Procedures?
Q14. Is it possible to combine cryptography with any other data security approach?
Q15. List the different Communications Control.
Q16. What is the relationship between Security Service and Mechanisms?
Q17. What are the different Deliberate Software Attacks challenges?
Q18. What Is Meant By Balancing Security And Access?
Q19. What Is The Difference Between Vulnerability And Exposure?
Q20. Define E-mail Spoofing?

You might also like