You are on page 1of 2

Prepared by Dr. Farhan M.

Shaikh SIC QB

Unit-1
1. Explain perimeter blockade and open access models.
2. Write a short note on the three Ds of security.
3. Explain briefly the components of a security program.
4. What is virus and explain its life-cycle
5. Explain different types of viruses.
6. Describe a DDoS attack. Explain its types.
7. What is the concept of Pharming (DNS Spoofing)? Explain.
8. Describe the CIA Triad of computer security.
9. Explain the onion model of defence.
10. Explain the zones of trust.
11. List various types of worms. Explain any two of them.
12. Write the steps for creating a security defence plan.
Unit-2
1. Write a short note on central storage and comparison system.
2. Explain CHAP and MS-CHAP.
3. Explain working of Kerberos.
4. Explain One Time Passwords (OTP) systems.
5. Explain SSL/TLS.
6. Explain smart-card based authentication.
7. Explain Role Based Authorization (RBAC).
8. What are ciphers? Explain “Transposition Cipher” VS “Substitution Cipher”
9. Explain CA hierarchy and certificate templates and enrolment.
10. Explain storage networks.
11. Explain Espionage, Packet Sniffing and Packet Replay.
12. Write a short note on hijacking and phishing.
13. Write a short note on integrity risks. Explain any 2.
14. Write a short note on availability risks. Explain any 2.
15. Explain importance of database backups? Explain various types of it
Unit-3
1. Write a short note on the Cisco Hierarchical Internetworking model.
2. Write a short note on DMZ networks.
3. List the various techniques for network hardening. Explain any 2.
4. Write a short note on Access Control Lists (ACLs).
5. Write a short note on Centralizing Account Management (AAA).
6. Explain different types of ICMP messages.
7. Write a short note on the features of a firewall.
8. Explain NAT.
9. Write a short note on firewall strengths and weaknesses.
10. Explain the importance of antenna choice and positioning.
11. What is spread spectrum technique? List the two techniques to spread the bandwidth.
Unit-4
1.What are IDS types? Explain.
2. What are IDS models? Explain.

Disclaimer: This is just a sample question bank. All questions in the exam may not be from the question bank.
3. Write a short note on IDS management.
4. What is SIEM? What are its features?
5. List the various VoIP components. Explain any 2.
6. What is PBX? What are its features? Explain common attacks on PBX. How to secure it.
7. What is Telecom Expense Management (TEM)? Explain.
8. Write a short note on ACLs. What are its two types? Explain.
9. Write a short note on TCSEC.
10. Write a short note on Reference Monitor.
11. Write a short note on Microsoft’s Trustworthy Computing initiative.
Unit-5
1. What is hypervisor? How to protect the hypervisor?
2. How to protect the guest OS, virtual storage and virtual networks?
3. Explain any two confidentiality risks associated with cloud computing and their remediation.
4. Explain any two integrity risks associated with cloud computing and their remediation.
5. Explain any two availability risks associated with cloud computing and their remediation.
6. Write a short note on Secure Development Lifecycle (SDL).
7. List and explain any 3 Client Application Security issues. How to resolve them?
8. What is custom remote administration? What are its advantages and disadvantage?
9. Write a short note on classification of assets.
10. Explain any 5 criteria for choosing site location for security?
11. Write a short note on strategies for securing assets.

Disclaimer: This is just a sample question bank. All questions in the exam may not be from the question bank.

You might also like