Вы находитесь на странице: 1из 4

ASSIGNMENT 1

SET-1

Q1. Masquerading can compromise with the authenticity. Comment

Q2. Sometimes instructions say that I must “be root.” What does this mean in Linux?

Q3. The security of the information is a must need but how can you ensure the same?

Q4. Is it mandatary for any organisation to comply with the security standards and
regulations.?

SET-2

Q1. Give an example of a type of publication for which confidentiality of the stored data is
the most important requirement.

Q2. List the various challenges faced in the Information security.

Q3. PKI involves two keys. Elaborate the purpose why 2 keys are needed.

Q4. If you want to remove the password assigned to a group which command will you use.

SET-3

Q1. Mention the principles of the Information Security.

Q2. The security in a system is a dire need. Justify


Q3. List various CA’s those are top ranked in the world and compare their packages..
Q4. Is it correct to say that AAA is a family of protocols which mediate network access.?

SET-4

Q1.List down some of the Information Security Standards needed in any organisation.
Q2. Is there any way for controlling access to computer resources and enforcing policies?
Q3. The goals and principles of the Information Security are needed to secure any system.
Do u agree?
Q4. I need a framework to enforce policies and audit usage. Can i ensure the same?

SET-5

Q1: Give an example of a type of publication for which integrity of the stored data is the
most important requirement.

Q.2 You are required to restore the file memo.ben. It was backed up in the tar file
MyBackup.tar. Which command would you use to do it?

Q.3 : Encryption can hide all the data? Is it so?

Q. 4: Is there a way to use one command to start more than one program at a time?

SET-6

Q1: Is it possible to track user activities on an IP-based network and controlling their access
to network resources?

Q2 Compare the various process to encode any data.

Q. 3: Are there any standards laid down for the security by the organisations?

Q4: Give an example of a type of publication for which integrity of the stored data is the
most important requirement..

SET-7

Q. 1 Some of the information security standards are laid down in 2017. Discuss their need.

Q.2 Standards and regulations are important for security. Discuss.

Q.3 Give an example of a type of publication for which availability of the stored data is the
most important requirement.

Q. 4: The security firms those provide the solution to information security threats may be
the reason for the same. What is your opinion on the same. Validate.
SET-8

Q1: Standards and regulations are important for security. Discuss

Q.2 Give an example of a type of publication for which integrity of the stored data is the
most important requirement.

Q.3 : Encryption can hide all the data? Is it so?

Q. 4: I need a framework to enforce policies and audit usage. Can i ensure the same?

SET-9

Q. 1 List the various challenges faced in the Information security..

Q.2 Sometimes instructions say that I must “be root.” What does this mean in Linux?

Q3. The security of the information is a must need but how can you ensure the same?

Q.4: The security firms those provide the solution to information security threats may be the
reason for the same. What is your opinion on the same. Validate.

SET-10

Q1List down some of the Information Security Standards needed in any organisation

Q2 The security firms those provide the solution to information security threats may be the
reason for the same. What is your opinion on the same. Validate.

Q.3: Are there any standards laid down for the security by the organisations?

SET-11

Q1. Mention the principles of the Information Security.

Q2. The security in a system is a dire need. Justify


Q3. List various CA’s those are top ranked in the world and compare their packages..
SET-12

Q1. Give an example of a type of publication for which confidentiality of the stored data is
the most important requirement.

Q2. List the various challenges faced in the Information security.

Q3. If you want to remove the password assigned to a group which command will you use.

Вам также может понравиться