You are on page 1of 3

School of Computer Science and Engineering

BCSE454E - Information Security Management

Winter Semester 2023-24

Continuous Assessment Test-1 – Sample Question Set

Module 1:

1. A Company has 4 departments and requirements to establish a network has been


given in following table. Suggest and justify appropriate Network devices
required to create an effective network with optimum cost. Also explain the
configuration methods. (10)

DEPARTM NUMBER SECURITY


ENT OF LEVEL
NAME SYSTEMS

Marketing 100 Low

Finance 50 High

HR 75 High

Sales 100 Medium

2. Consider an organisation has various departments like HR, Finance, production


and dispatch. As a security management professional, highlight the use of Identify
and Access Management (IDAM) in various level at each department. (10 marks)

3. Compare the usage, functionality and implementation of Storage Devices, Servers,


and Infrastructure Devices in a secured network. (10 marks)

4. What is the process to proactively detect/analyze invalid user access or any


anomalies in applications or network traffic in your organization? What kind of
response and remediation procedures do you have in place to handle any incidents
identified through this analysis? Elaborate about that component needed to
protect your network. (10 marks) Ans: IDAM
7. What do you mean by Packet Filtering in Firewall? Explain the different
techniques being used by Firewall to filter out packets with neat block diagram.
(10 marks)

8. If a company developed its website using Content Management System, Is it


susceptible to any vulnerabilities and Cyber threats? Explain it in detail.(10
marks)

9. State the merits and demerits of Standard ACL and Extended ACL (5 marks)

Module 4:

10. Being in an Information Security organization, what would be the impact of


miscommunication with your team members as well as your customer. Also,
provide few tips for effective communication with your peers. (5 marks)

11. Discuss the ways to communicate effectively with colleagues at the workplace
both verbally and non-verbally. As an employee of an esteemed institution, what
are the golden rules one has to follow to ensure high productivity in the
organization by means of effective communication (5)

12. If you are receiving a confusing or unclear email message, how will you react?
Discuss the basic rules of email communication to ensure high productivity in the
organization by means of effective email communication. (5)

13. Being in an Information Security organization, what would be the impact of


miscommunication with your team members as well as your customer. Also,
provide few tips for effective communication with your peers. (5)

14. As an employee of an esteemed institution, what are the golden rules one has to
follow to ensure high productivity in the organization by means of effective
communication? (5)
15. Ineffective communications in a workplace reduces our ability to execute. A
survey conducted and found that companies with employees who communicate
well are more productive and experience lowers rates of employee churn. Explain
the barriers to effective communication and discuss the ways to communicate
effectively at work. (5 marks)
16. IT companies branches are spread across a huge geographical area (and many
time zones). Similarly project team members are also distributed located. One
works in your city but works in a different building a few blocks away, and the
other two are based in an office that is over 1,000 miles away. All of them are
relatively new to your company.
 One joined late last year,
 One started a year ago, and
 The third is brand new – you have never met him.
Present a strategy for ensuring that the team communicates adequately. (5)
Module 5:
17. Occupational health needs better administration and gain more time to improve
worker health and wellness. Design Occupational health software requirements to
handle industrial hygiene. (5)
18. Any Organisation has to comply with its current health, safety and security
policies and procedures, and to report any identified breaches in health, safety,
and Security policies and procedures. Design a Wellness Management Program to
train the employees on the above factors. (5)
19. Safety of workers refers to the provision of a safe environment, safe equipment
and safe procedures in the workplace in order to ensure workers' health
and safety. Design a Safety and Wellness Management Program to train the
employees on the above factors. (5)

20. Discuss in detail about main types of breaches in health, safety and security. (5)

21. The work environment can influence peoples' behavior and motivation to act.
Discuss the Physical hazards and risks that workers encounter at their workplace
and suggest some measures to handle them. (5)

22. Define a hazard. State the different types of health and safety hazards that can be
found in the workplace. (5)

You might also like