Академический Документы
Профессиональный Документы
Культура Документы
SET-1
Q2. Sometimes instructions say that I must “be root.” What does this mean in Linux?
Q3. The security of the information is a must need but how can you ensure the same?
Q4. Is it mandatary for any organisation to comply with the security standards and
regulations.?
SET-2
Q1. Give an example of a type of publication for which confidentiality of the stored data is
the most important requirement.
Q3. PKI involves two keys. Elaborate the purpose why 2 keys are needed.
Q4. If you want to remove the password assigned to a group which command will you use.
SET-3
SET-4
Q1.List down some of the Information Security Standards needed in any organisation.
Q2. Is there any way for controlling access to computer resources and enforcing policies?
Q3. The goals and principles of the Information Security are needed to secure any system.
Do u agree?
Q4. I need a framework to enforce policies and audit usage. Can i ensure the same?
SET-5
Q1: Give an example of a type of publication for which integrity of the stored data is the
most important requirement.
Q.2 You are required to restore the file memo.ben. It was backed up in the tar file
MyBackup.tar. Which command would you use to do it?
Q. 4: Is there a way to use one command to start more than one program at a time?
SET-6
Q1: Is it possible to track user activities on an IP-based network and controlling their access
to network resources?
Q. 3: Are there any standards laid down for the security by the organisations?
Q4: Give an example of a type of publication for which integrity of the stored data is the
most important requirement..
SET-7
Q. 1 Some of the information security standards are laid down in 2017. Discuss their need.
Q.3 Give an example of a type of publication for which availability of the stored data is the
most important requirement.
Q. 4: The security firms those provide the solution to information security threats may be
the reason for the same. What is your opinion on the same. Validate.
SET-8
Q.2 Give an example of a type of publication for which integrity of the stored data is the
most important requirement.
Q. 4: I need a framework to enforce policies and audit usage. Can i ensure the same?
SET-9
Q.2 Sometimes instructions say that I must “be root.” What does this mean in Linux?
Q3. The security of the information is a must need but how can you ensure the same?
Q.4: The security firms those provide the solution to information security threats may be the
reason for the same. What is your opinion on the same. Validate.
SET-10
Q1List down some of the Information Security Standards needed in any organisation
Q2 The security firms those provide the solution to information security threats may be the
reason for the same. What is your opinion on the same. Validate.
Q.3: Are there any standards laid down for the security by the organisations?
SET-11
Q1. Give an example of a type of publication for which confidentiality of the stored data is
the most important requirement.
Q3. If you want to remove the password assigned to a group which command will you use.