0% found this document useful (0 votes)
26 views2 pages

Cyber Security Diploma

Diploma 3rd year model papers n questions papers

Uploaded by

infosys152000
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views2 pages

Cyber Security Diploma

Diploma 3rd year model papers n questions papers

Uploaded by

infosys152000
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

1. Who are hackers? Explain different types of hackers?

Illustrate different hacking


methodology.
2. Elaborate the three dimensions of McCumber Cube.
3. How do you apply secure SDLC in each stage of software development?
4. Illustrate the importance of a). Hashing b). Digital Signature.
5. List and Explain different types of Malwares.
6. Illustrate the Vulnerability in different layer in OSI model.
7. Explain security principles – CIA and AAA.
8. What are the challenges in Cyber Security.
9. Write about different methods of infiltration.
10. Explain RSA algorithm. Using RSA solve p=5, q=11, key=27 , d=?
11. Elaborate Diffie-Hellman algorithm.
12. Euler Totient Function (100,256,165,16,72)
13. GCD of two numbers (256,145, 160, 70, 5, 11)
14. Explain Wireless security issues in Cellular network, Wi-Fi, LAN system, RFID
systems.
15. Explain the following Windows: a). Third Patch management b). Windows
Autopilot.
16. Explain Linux Hardening.
17. Explain SSH Hardening in Linux.
18. Explain Linux enhancements and infrastructure. OR Explain SE Linux & App Armor.
19. Explain Repositories in Linux. OR Explain Package Management in linux.
20. Illustrate linux operating system Vulnerability.
21. Explain Network Security Concepts a). Firewall b). IDS c). IPS.
22. What is IAST? Explain its advantages over SAST and DAST.
23. Explain the Software Development Life Cycle.
24. Illustrate static code analysis vs dynamci code analysis.
25. Explain RASP and Web application firewall(WAP).
26. What is threat modeling? Explain different threat modeling methodologies.
27. Explain different types of Cloud Models. Illustrate IaaS, SaaS and PaaS.
28. How Shared Responsibility Model is useful in Cloud Service. Explain it.
29. Explain Identity Access management(IAM) benefits.
30. Explain IAM best practices.
31. Explain security principles in Cloud.
32. Explain top 10 OWSAP issues in Web Applications. OR Explain issues in Web
Vulnerability.
33. Explain top 10 OWSAP issues in Mobile Applications. OR Explain top 10 OWSAP
in Mobile Vulnerability.
34. Explain issues in Cloud Services. OR Explain Cloud Vulnerabilities. OR
Explain Cloud misconfigurations.
35. Define Incident management. Explain the procedure followed during Incident
management and different states briefly
36. Explain Patch management that takes place during the software fixes.
37. Explain Vulnerability life cycle. Elaborate the types of vulnerabilities.
38. Explain GRC in an company and its benefits.
39. Explain ERM and types of risk faced by enterprise.
40. Explain DevOps and Security Challenges.
41. Elaborate Core Principles and Patterns of DevOps.
42. Explain CI/CD in DevOps.
43. How IT services are managed using ITIL Process. Explain it.
44. Explain how data is protected in cloud using Secrets Management.
45. Explain Android Mobile OS architecture vs iOS Mobile OS.
46. Explain SIEM.
47. Give two KRI examples each for the following domains: a). Patch Management
b). Anti-virus management c). Change Management
48. Design a sample cyber security dashboard for reporting to top management.
49. Explain docker and docker files.
50. Define Metrics. Explain type of Metrics. OR Explain Security Metrics from
OWASP.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy