0% found this document useful (0 votes)
25 views1 page

Imp of NIS

Uploaded by

sandeshlahane901
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views1 page

Imp of NIS

Uploaded by

sandeshlahane901
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

chapter 1

2 marks

1. Differentiate between viruses & worms


2. Give examples of Active & Passive Attacks (two each)
3. Identify any four individual user responsibilities in computer security
4. Define following terms : (i) Confidentiality (ii) Accountability
5. List any four virus categories.

4 marks
1.Explain active attack and passive attack with suitable example
2.Explain basic principles of information security
3.Describe the following terms : (i) Assels (ii) Vulnerability (iii) Risks
4.Define Hacking. Explain different types of Hackers.

chapter 2

2 marks

1. State any four advantages of Biometrics.


2. List any four biometric mechanisms
3. Explain the terms :
(i) Shoulder surfing
(ii) Piggybacking.
4. Define the following terms :
i) Authentication
ii) Authorization
4 marks
1.Enlist types of Biometrics & explain any one Biometrics type in detail
2.Explain any two password attacks.
3.Explain the mechanism of fingerprint & voice pattern in Biometrics.
4.Describe :
(i) Piggybacking
(ii) Dumpster diviing

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy