Network and Information Security -
Exam Ready Notes
Unit 1: Network & Information Security
Q1. What is CIA of security? (4M)
- Confidentiality: Prevent unauthorized access
- Integrity: Ensure data accuracy and trust
- Availability: Ensure access for authorized users
Q2. Describe the following attacks: i) Sniffing ii) Spoofing (4M)
- Sniffing: Capture network packets (Active/Passive)
- Spoofing: Fake identity to access information
Q3. What is virus? Describe various phases. (4M)
- Dormant: Idle phase
- Propagation: Self-replication
- Trigger: Activated
- Execution: Runs payload
Q4. Difference between worm and virus. (4M)
- Virus needs host; Worm does not
- Virus modifies data; Worm eats resources
- Virus is more harmful
Q5. Explain Man-in-middle and TCP/IP Hacking attacks. (4M)
- MITM: Attacker intercepts communication
- TCP/IP Hijacking: Bypass session to steal access
Q6. Define computer security. Explain the need. (2M)
- Prevent unauthorized use, protect data, identity, and systems
Q7. What is Risk? How it can be analyzed? (2M)
- Identify → Analyze → Estimate impact → Manage risk
Q8. Define Virus and logic bomb. (2M)
- Virus: Replicates, needs host
- Logic Bomb: Code triggers on condition
Q9. Difference between Passive and Active attacks. (4M)
- Passive: No data change, breaks confidentiality
- Active: Modifies data, harms integrity/availability
Q10. Explain Intruders and Insiders. (4M)
- Intruders: External attackers
- Insiders: Misuse internal access
Q11. Describe Hotfix. (2M)
- Urgent fix for bugs/security issues
Q12. Define attack. Explain steps in attack. (4M)
- Steps: Recon → Scanning → Access → Backdoor → Cover tracks
Unit 2: User Authentication and Access Control
Q1. Enlist types of biometric. Explain any one. (4M)
- Types: Fingerprint, Iris, Retina, Face, Voice
- Fingerprint: Unique ridges used for identity
Q2. Describe piggybacking and shoulder surfing. (4M)
- Piggybacking: Delay ACK and attach data
- Shoulder Surfing: Spy over shoulder for info
Q3. Explain access control policies. (4M)
- DAC: Owner controls access
- MAC: Sensitivity-based
- RBAC: Role-based access
Q4. What is dumpster diving? (2M)
- Retrieving sensitive data from trash
Q5. State any four advantages of biometrics. (2M)
- High security, Fast, Non-transferable, Spoof-proof
Q6. Explain criteria for password selection. (2M)
- Use mix of cases, symbols, no names, 12+ chars
Q7. Explain fingerprint and retina pattern. (4M)
- Fingerprint: Scan & match ridge pattern
- Retina: Infrared eye scan, highly secure
Q8. Explain fingerprint mechanism and limitations. (4M)
- Scan → Match template → Access
- Limitations: Skin condition, hygiene issues
Unit 4: Firewall and Intrusion Detection System
Q1. State any four limitation of firewall. (2M)
- Can’t block modem use, enforce passwords, stop social engineering, or harmful websites
Q2. Describe the term DMZ with diagram. (2M)
- DMZ: Subnet between LAN and Internet, hosts public servers
Q3. Describe term IDS. (2M)
- IDS: Detects suspicious activity
- NIDS: Network-based
- HIDS: Host-based
Q4. Application of firewall and limitations. (4M)
- Controls app traffic
- Can’t block all viruses or malicious sites
Q6. Explain characteristics and type of firewall. (4M)
- All traffic via firewall, enforce policy
- Types: Packet Filter, Circuit-Level, Proxy
Q7. Describe packet Filter router firewall. (4M)
- Filters packets using IP, Port, Protocol
- Actions: ACCEPT/DROP based on rules
Unit 5: Network Security, Cyber Laws and Compliance
Q1. Explain the concept of Kerberos. (2M)
- Auth protocol using tickets
- 3 Parts: Client, Server, KDC
Q2. Describe IP Security architecture. (2M)
- IPSec: Secures IPv4/6
- Provides: Confidentiality, Integrity, Auth
Q3. Explain e-mail security technique (PGP). (4M)
- Combines hashing, symmetric + public key
- Ensures: Privacy, Integrity, Auth, Non-repudiation
Q4. What is software piracy? (4M)
- Illegal use/distribution of software
- Types: Softlifting, Counterfeiting, etc.